CVE-2026-3605

ADVISORY - github

Summary

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

EPSS Score: 0.00012 (0.017)

Common Weakness Enumeration (CWE)

ADVISORY - nist

Authentication Bypass Using an Alternate Path or Channel

ADVISORY - github

Authentication Bypass Using an Alternate Path or Channel

ADVISORY - redhat

Authorization Bypass Through User-Controlled Key


Sign in to Docker Scout

See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.

Sign in