The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-6000

CVE-2025-6000: HashiCorp Vault RCE Vulnerability

CVE-2025-6000 is a remote code execution vulnerability in HashiCorp Vault that allows privileged operators to execute code on the host. This article covers technical details, affected versions, impact, and mitigation.

Published: March 11, 2026

CVE-2025-6000 Overview

A critical code execution vulnerability has been identified in HashiCorp Vault that allows a privileged Vault operator within the root namespace with write permission to sys/audit to obtain code execution on the underlying host when a plugin directory is configured. This vulnerability (CWE-94: Code Injection) enables attackers with elevated privileges to break out of Vault's security boundary and execute arbitrary code on the host system.

Critical Impact

Privileged Vault operators can achieve host-level code execution, potentially compromising the entire infrastructure hosting Vault and any secrets managed by the system.

Affected Products

  • HashiCorp Vault Community Edition versions prior to 1.20.1
  • HashiCorp Vault Enterprise versions prior to 1.20.1, 1.19.7, 1.18.12, and 1.16.23
  • HashiCorp Vault Enterprise 1.20.0

Discovery Timeline

  • August 1, 2025 - CVE-2025-6000 published to NVD
  • August 13, 2025 - Last updated in NVD database

Technical Details for CVE-2025-6000

Vulnerability Analysis

This vulnerability represents a code injection flaw that enables privilege escalation from Vault operator to host-level code execution. The attack requires a combination of elevated Vault privileges and specific configuration settings to be exploited.

The vulnerability exists in Vault's audit device functionality. When a Vault operator has write permissions to the sys/audit endpoint within the root namespace and a plugin directory has been configured in Vault's settings, the operator can leverage this access to execute arbitrary code on the underlying host system.

The scope of this vulnerability extends beyond the Vault application itself, as successful exploitation grants the attacker control over the host operating system. This represents a significant security boundary violation, allowing what should be application-level privileges to escalate to host-level access.

Root Cause

The root cause is classified as CWE-94 (Improper Control of Generation of Code / Code Injection). The vulnerability stems from insufficient validation and access controls in the audit device registration path when interacting with the plugin system. When a plugin directory is configured, the combination of root namespace access and sys/audit write permissions creates an exploitation pathway that allows code injection at the host level.

Attack Vector

The attack is network-accessible and requires high privileges to execute. An attacker must first obtain or already possess Vault operator credentials with write access to sys/audit in the root namespace. The target Vault instance must also have a plugin directory configured.

The exploitation flow involves:

  1. Attacker authenticates to Vault with privileged operator credentials
  2. Attacker confirms write access to sys/audit endpoint in the root namespace
  3. Attacker leverages the plugin directory configuration to inject malicious code
  4. Code executes on the underlying host system with the privileges of the Vault process

While no public proof-of-concept exploits have been published, the technical requirements for exploitation are well-documented in the advisory. Organizations should assume that sophisticated threat actors could develop working exploits based on the vulnerability description.

Detection Methods for CVE-2025-6000

Indicators of Compromise

  • Unexpected audit device registrations or modifications in Vault's sys/audit endpoint
  • Unusual plugin activity or new plugin registrations in the configured plugin directory
  • Anomalous process execution originating from the Vault process or its parent
  • Unexpected outbound network connections from the Vault host

Detection Strategies

  • Monitor Vault audit logs for write operations to sys/audit from non-standard administrative accounts
  • Implement file integrity monitoring on the plugin directory to detect unauthorized additions or modifications
  • Deploy endpoint detection and response (EDR) solutions to identify suspicious child processes spawned by Vault
  • Enable command-line auditing on the Vault host to capture any unauthorized code execution

Monitoring Recommendations

  • Configure alerting for any changes to audit device configurations in Vault
  • Establish baseline activity patterns for privileged Vault operators and alert on deviations
  • Monitor system calls and process creation events on Vault hosts using security tools like SentinelOne
  • Implement network segmentation monitoring to detect unexpected lateral movement from Vault infrastructure

How to Mitigate CVE-2025-6000

Immediate Actions Required

  • Upgrade HashiCorp Vault Community Edition to version 1.20.1 or later immediately
  • Upgrade HashiCorp Vault Enterprise to version 1.20.1, 1.19.7, 1.18.12, or 1.16.23 depending on your version branch
  • Audit all accounts with write access to sys/audit in the root namespace and revoke unnecessary privileges
  • Review plugin directory configurations and restrict access to essential use cases only

Patch Information

HashiCorp has released fixed versions addressing this vulnerability. Organizations should upgrade to the patched versions as soon as possible:

EditionFixed Version(s)
Community Edition1.20.1
Enterprise1.20.1, 1.19.7, 1.18.12, 1.16.23

For complete details, refer to the HashiCorp Security Advisory HCSEC-2025-14.

Workarounds

  • Remove or disable the plugin directory configuration if plugins are not required for your deployment
  • Implement strict access controls limiting sys/audit write permissions to only essential administrative accounts
  • Use Sentinel policies (Enterprise) to add additional authorization requirements for audit device modifications
  • Consider running Vault in a containerized environment with restricted capabilities to limit the impact of potential host-level compromise
bash
# Review current audit device configuration
vault audit list -detailed

# Check plugin directory configuration in Vault config
grep -i "plugin_directory" /etc/vault.d/vault.hcl

# Verify accounts with sys/audit permissions
vault policy list | xargs -I {} vault policy read {} | grep -A5 "sys/audit"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechHashicorp Vault

  • SeverityCRITICAL

  • CVSS Score9.1

  • EPSS Probability0.09%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-94
  • Vendor Resources
  • HashiCorp Security Advisory HCSEC-2025-14
  • Related CVEs
  • CVE-2025-4166: HashiCorp Vault Information Disclosure Bug

  • CVE-2025-6203: HashiCorp Vault DoS Vulnerability

  • CVE-2024-7594: HashiCorp Vault Auth Bypass Vulnerability

  • CVE-2023-3462: HashiCorp Vault Auth Bypass Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English