Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/hashicorp/vault
  4. ›
  5. CVE-2024-5798

CVE-2024-5798: HashiCorp Vault Incorrectly Validated JSON Web Tokens (JWT) Audience Claims

June 12, 2024 (updated August 7, 2025)

Vault and Vault Enterprise did not properly validate the JSON Web Token (JWT) role-bound audience claim when using the Vault JWT auth method. This may have resulted in Vault validating a JWT the audience and role-bound claims do not match, allowing an invalid login to succeed when it should have been rejected.

This vulnerability, CVE-2024-5798, was fixed in Vault and Vault Enterprise 1.17.0, 1.16.3, and 1.15.9

References

  • discuss.hashicorp.com/t/hcsec-2024-11-vault-incorrectly-validated-json-web-tokens-jwt-audience-claims/67770
  • github.com/advisories/GHSA-32cj-5wx4-gq8p
  • github.com/hashicorp/vault
  • nvd.nist.gov/vuln/detail/CVE-2024-5798
  • pkg.go.dev/vuln/GO-2024-2921

Code Behaviors & Features

Detect and mitigate CVE-2024-5798 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.11.0 before 1.15.9, all versions starting from 1.16.0-rc1 before 1.16.3, all versions starting from 1.17.0-rc1 before 1.17.0, version 1.17.0-rc1

Fixed versions

  • 1.17.0
  • 1.16.3
  • 1.15.9

Solution

Upgrade to versions 1.15.9, 1.16.3, 1.17.0 or above.

Impact 2.6 LOW

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-285: Improper Authorization

Source file

go/github.com/hashicorp/vault/CVE-2024-5798.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 27 Aug 2025 12:18:25 +0000.