top of page
perceptive_background_267k.jpg

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation when logging in via JW…

Published:

26 maart 2026 om 23:00:00

Alert date:

27 maart 2026 om 20:07:04

Source:

nvd.nist.gov

Click to open the original link from this advisory

Identity & Access, Security Tools

OpenBao versions prior to 2.5.2 contain an authentication bypass vulnerability in JWT/OIDC login with direct callback mode. The vulnerability allows attackers to perform remote phishing attacks by tricking victims into visiting URLs that automatically log them into the attacker's session. The direct mode bypasses user confirmation prompts and allows attackers to poll for OpenBao tokens. Version 2.5.2 fixes this by adding a confirmation screen requiring manual user interaction. Workarounds include removing roles with callback_mode=direct or enforcing confirmation on the token issuer side.

Technical details

Mitigation steps:

Affected products:

OpenBao

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page