CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-6000
7.20.03%

Vaulted Severance: Turning Audit Logs into Remote Shells

Amit Schendel
Amit Schendel
Senior Security Researcher

Jan 1, 2026·5 min read·7 visits

Weaponized

Executive Summary (TL;DR)

If you have a root token (or 'sys/audit' write privs) in Vault, you can trick the audit logger into writing a binary payload to the plugin directory and executing it. This breaks the boundary between the Vault application and the underlying host OS, allowing a complete container escape or host compromise.

A critical privilege escalation vulnerability in HashiCorp Vault allows privileged operators to achieve Remote Code Execution (RCE) on the host system. By abusing the File Audit Device and Plugin System, an attacker can write executable audit logs to the plugin directory and execute them.

Official Patches

HashiCorpOfficial Security Advisory

Technical Appendix

CVSS Score
7.2/ 10
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Probability
0.03%
Top 88% most exploited

Affected Systems

HashiCorp Vault Community Edition < 1.20.1HashiCorp Vault Enterprise < 1.20.1

Affected Versions Detail

Product
Affected Versions
Fixed Version
Vault
HashiCorp
>= 0.8.0, < 1.16.231.16.23
Vault
HashiCorp
>= 1.17.0, < 1.18.121.18.12
Vault
HashiCorp
>= 1.19.0, < 1.19.71.19.7
Vault
HashiCorp
>= 1.20.0, < 1.20.11.20.1
AttributeDetail
Attack VectorNetwork (Authenticated)
CVSS v3.17.2 (High)
CWECWE-73 (External Control of File Name or Path)
Privileges RequiredHigh (Audit Write)
Exploit StatusPoC Available / Weaponized
ImpactRemote Code Execution (RCE)

MITRE ATT&CK Mapping

T1059.001Command and Scripting Interpreter
Execution
T1574.002DLL Side-Loading
Persistence
T1068Exploitation for Privilege Escalation
Privilege Escalation
CWE-73
External Control of File Name or Path

The software allows user input to control or influence paths used in filesystem operations, allowing attackers to access or modify unintended files.

Known Exploits & Detection

Cyata SecurityOuttieFinder detection tool logic implies the exploit methodology.

Vulnerability Timeline

Vulnerability Disclosed by HashiCorp
2025-01-14
Fixed Versions Released
2025-01-14
OuttieFinder Detection Tool Released
2025-01-15

References & Sources

  • [1]HashiCorp Advisory

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.