OpenBao has a Timing Side-Channel in the Userpass Auth Method
Package
Affected versions
>= 0.1.0, < 2.3.2
< 0.0.0-20250806193356-4d9b5d3d6486
Patched versions
2.3.2
0.0.0-20250806193356-4d9b5d3d6486
Description
Published to the GitHub Advisory Database
Aug 8, 2025
Reviewed
Aug 8, 2025
Published by the National Vulnerability Database
Aug 9, 2025
Last updated
Aug 11, 2025
Impact
When using OpenBao's
userpass
auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user.Patches
OpenBao v2.3.2 will patch this issue.
Workarounds
Users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/
References
This issue was disclosed to HashiCorp and is the OpenBao equivalent of the following tickets:
Barring further information, this is also assumed to cover and remediate the following additional vulnerability:
If this is not the case as further details emerge, a new CVE will be assigned for remediating that. Otherwise, no further CVE will be sought.
References