


Perceptive Security
SOC/SIEM Consultancy

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation when logging in via JW…
Published:
26 maart 2026 om 23:00:00
Alert date:
27 maart 2026 om 20:07:04
Source:
nvd.nist.gov
Identity & Access, Security Tools
OpenBao versions prior to 2.5.2 contain an authentication bypass vulnerability in JWT/OIDC login with direct callback mode. The vulnerability allows attackers to perform remote phishing attacks by tricking victims into visiting URLs that automatically log them into the attacker's session. The direct mode bypasses user confirmation prompts and allows attackers to poll for OpenBao tokens. Version 2.5.2 fixes this by adding a confirmation screen requiring manual user interaction. Workarounds include removing roles with callback_mode=direct or enforcing confirmation on the token issuer side.
Technical details
Mitigation steps:
Affected products:
OpenBao
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-33757
https://datatracker.ietf.org/doc/html/rfc8628#section-5.4
https://github.com/openbao/openbao/commit/e32103951925723e9787e33886ab6b6ec20f4964
https://github.com/openbao/openbao/security/advisories/GHSA-7q7g-x6vg-xpc3
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
