Vault Vulnerable to Server-Side Request Forgery in ACME Challenge Validation via Attacker-Controlled DNS
Summary
| CVE | CVE-2026-5052 |
|---|---|
| State | PUBLISHED |
| Assigner | HashiCorp |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-17 04:16:12 UTC |
| Updated | 2026-04-27 15:03:10 UTC |
| Description | Vault’s PKI engine’s ACME validation did not reject local targets when issuing http-01 and tls-alpn-01 challenges. This may lead to these requests being sent to local network targets, potentially leading to information disclosure. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16. |
Risk And Classification
Primary CVSS: v3.1 8.6 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
EPSS: 0.000090000 probability, percentile 0.009730000 (date 2026-04-21)
Problem Types: CWE-918 | CWE-918 CWE-918: Server-Side Request Forgery (SSRF)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 8.6 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
| 3.1 | [email protected] | Secondary | 5.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
| 3.1 | CNA | CVSS | 5.3 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
ChangedConfidentiality
HighIntegrity
NoneAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | HashiCorp | Vault | affected 1.15.0 2.0.0 semver | 64 bit, 32 bit, x86, ARM, MacOS, Windows, Linux |
| CNA | HashiCorp | Vault Enterprise | affected 1.15.0 2.0.0 semver | 64 bit, 32 bit, x86, ARM, MacOS, Windows, Linux |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| discuss.hashicorp.com/t/hcsec-2026-06-vault-vulnerable-to-server-side-request-forge... | [email protected] | discuss.hashicorp.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: This issue was independently identified and reported by Oleh Konko of 1seal, as well as Vipin Chaudhary. (en)
There are currently no legacy QID mappings associated with this CVE.