- Description
- A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.
- Source
- security@hashicorp.com
- NVD status
- Analyzed
- Products
- vault
CVSS 3.1
- Type
- Secondary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- security@hashicorp.com
- CWE-770
- Hype score
- Not currently trending
The battlefield's hot! HashiCorp Vault's CVE-2025-6203 risks DoS, and Astro Cloudflare Adapter's CVE-2025-58179 invites harmful scripts. Keep your defenses sharp, patch those holes!
@K3YPTlC
9 Sept 2025
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Critical DoS vulnerability (CVE-2025-6203) found in HashiCorp Vault. Upgrade to patched versions now to protect your servers. Link: https://t.co/UIsm6EfcrW #Security #Patch #Servers #Update #Risk #Bug #Exploit #Threat #Attack #Crash #Defense #Protection #Technology #Software
@dailytechonx
2 Sept 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨🚨CVE-2025-6203 hits HashiCorp Vault! Malicious users can exploit a DoS flaw, sending crafted payloads to spike CPU & memory, potentially crashing servers. Search by vul.cve Filter👉vul.cve="CVE-2025-6203" ZoomEye Dork👉app="Hashicorp Vault" Over 29.8k vulnerable
@zoomeye_team
2 Sept 2025
995 Impressions
3 Retweets
13 Likes
2 Bookmarks
1 Reply
0 Quotes
🚨Alert🚨CVE-2025-6203: DoS Flaw in HashiCorp Vault Allows Attackers to Crash Servers 📊123.6K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/xHOmRHMcOk 👇Query HUNTER : https://t.co/q9rtuGfZuz="HashiCorp Vault" https://t.co/yToXTZk
@HunterMapping
2 Sept 2025
2288 Impressions
8 Retweets
26 Likes
3 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨CVE-2025-6203: DoS Flaw in HashiCorp Vault Allows Attackers to Crash Servers 📊123.6K Services are found on the https://t.co/ysWb28BTvF yearly. 🔗Hunter Link:https://t.co/xHOmRHMcOk 👇Query HUNTER : https://t.co/q9rtuGfZuz="HashiCorp Vault" https://t.co/Mpe1UnT
@HunterMapping
2 Sept 2025
96 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️⚠️ CVE-2025-6203: DoS Flaw in HashiCorp Vault Allows Attackers to Crash Servers 🎯32.8k+ Results are found on the https://t.co/pb16tGYaKe nearly year 🔗FOFA Link: https://t.co/GxG3J1bCW5 FOFA Query:app="HashiCorp-Vault" 🔖Refer:https://t.co/03cKPXixbM #OSINT #FOFA
@fofabot
2 Sept 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-6203 A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumptio… https://t.co/OZKicTXabW
@CVEnew
28 Aug 2025
552 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "C75B707B-CECA-4F3F-B7A5-3A63627E23E0",
"versionEndExcluding": "1.16.27",
"versionStartIncluding": "1.15.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
"matchCriteriaId": "FFB5EFCB-595D-405C-AEE5-D3A674079A42",
"versionEndExcluding": "1.21.0",
"versionStartIncluding": "1.15.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "BB39834B-EF79-4C8B-B344-D81B15652821",
"versionEndExcluding": "1.18.15",
"versionStartIncluding": "1.18.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "167CFBBB-E0DF-42AB-84AA-4BF19C3873DB",
"versionEndExcluding": "1.19.11",
"versionStartIncluding": "1.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "466A7DC1-B9A3-4413-AA3E-AFAF34350E52",
"versionEndExcluding": "1.20.5",
"versionStartIncluding": "1.20.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]