Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-6000— Arbitrary Remote Code Execution via Plugin Catalog Abuse

CVSS 9.1 · Critical EPSS 0.24% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-6000

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Arbitrary Remote Code Execution via Plugin Catalog Abuse
Source: NVD (National Vulnerability Database)
Vulnerability Description
A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
HashiCorp Vault Enterprise和HashiCorp Vault Community Edition 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
HashiCorp Vault Enterprise和HashiCorp Vault Community Edition都是美国HashiCorp公司的产品。HashiCorp Vault Enterprise是一个企业信息归档平台。HashiCorp Vault Community Edition是一款密钥管理工具。 HashiCorp Vault Community Edition 1.20.1之前版本和HashiCorp Vault Enterprise 1.20.1、1.19.7、1.18.12和
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
HashiCorpVault 0.8.0 ~ 1.20.1 -
HashiCorpVault Enterprise 0.8.0 ~ 1.20.1 -

II. Public POCs for CVE-2025-6000

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-6000

登录查看更多情报信息。

Same Patch Batch · HashiCorp · 2025-08-01 · 7 CVEs total

CVE-2025-59997.2 HIGHVault Root Namespace Operator May Elevate Token Privileges
CVE-2025-60376.8 MEDIUMVault Certificate Auth Method Did Not Validate Common Name For Non-CA Certificates
CVE-2025-60146.5 MEDIUMVault TOTP Secrets Engine Code Reuse
CVE-2025-60155.7 MEDIUMVault Login MFA Bypass of Rate Limiting and TOTP Code Reuse
CVE-2025-60045.3 MEDIUMVault Userpass and LDAP User Lockout Bypass
CVE-2025-60113.7 LOWTiming Side-Channel in Vault’s Userpass Auth Method

IV. Related Vulnerabilities

V. Comments for CVE-2025-6000

No comments yet


Leave a comment