HCSEC-2025-24 - Vault Denial of Service Though Complex JSON Payloads

Bulletin ID: HCSEC-2025-24

Affected Products / Versions: Vault Community and Vault Enterprise 1.15.0 up to 1.20.2, 1.19.8, 1.18.13, and 1.16.24; fixed in Vault 1.20.3, 1.19.9, 1.18.14, 1.16.25

Publication Date: August 28, 2025

Summary

A malicious user may submit a specially-crafted complex payload that otherwise meets the default request size limit which results in excessive memory and CPU consumption of Vault. This may lead to a timeout in Vault’s auditing subroutine, potentially resulting in the Vault server to become unresponsive. This vulnerability, CVE-2025-6203, is fixed in Vault Community Edition 1.20.3 and Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25.

Background

Vault’s audit devices keep a detail of every request to Vault log every interaction, and a request does not complete until the audit operation is completed.

Vault enforces a max_request_size (32MiB by default) which can be further configured by operators.

Details

In addition to max_request_size, Vault now enforces and provides new listener options to set limits on JSON request payloads : max_json_depth, max_json_string_value_length, max_json_object_entry_count, and max_json_array_element_count. More information about these listener configuration options can be found in the API documentation and upgrade guide.

Remediation

Customers should evaluate the risk associated with these issues and consider upgrading to Vault Community Edition 1.20.3 or Vault Enterprise 1.20.3, 1.19.9, 1.18.14, and 1.16.25. Please refer to Upgrading Vault for general guidance.

Acknowledgement

This issue was identified by Darrell Bethea, Ph.D. of Indeed who reported it to HashiCorp.

We deeply appreciate any effort to coordinate disclosure of security vulnerabilities. For information about security at HashiCorp and the reporting of security vulnerabilities, please see https://hashicorp.com/security.