CVE-2026-3605
ADVISORY - githubSummary
An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
EPSS Score: 0.00012 (0.017)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Authentication Bypass Using an Alternate Path or Channel
ADVISORY - github
Authentication Bypass Using an Alternate Path or Channel
ADVISORY - redhat
Authorization Bypass Through User-Controlled Key
Sign in to Docker Scout
See which of your images are affected by this CVE and how to fix them by signing into Docker Scout.
Sign in