Vault Community and Vault Enterprise Key/Value (kv) Version 2 plugin may unintentionally expose sensitive information in server and audit logs when users submit malformed payloads during secret creation or update operations via the Vault REST API. This vulnerability, identified as CVE-2025-4166, is fixed in Vault Community 1.19.3 and Vault Enterprise 1.19.3, 1.18.9, 1.17.16, 1.16.20.
CVE ID: CVE-2025-4166
CVSS Base Severity: MEDIUM
CVSS Base Score: 4.5
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N
Vendor: HashiCorp
Product: Vault, Vault Enterprise
EPSS Score: 0.03% (probability of being exploited)
EPSS Percentile: 7.16% (scored less or equal to compared to others)
EPSS Date: 2025-05-31 (when was this score calculated)