Description
Vault’s Terraform Provider incorrectly set the default deny_null_bind parameter for the LDAP auth method to false by default, potentially resulting in an insecure configuration. If the underlying LDAP server allowed anonymous or unauthenticated binds, this could result in authentication bypass. This vulnerability, CVE-2025-13357, is fixed in Vault Terraform Provider v5.5.0.
Published: 2025-11-21
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication bypass via LDAP anonymous binds
Action: Immediate Patch
AI Analysis

Impact

The Vault Terraform Provider was found to incorrectly default the deny_null_bind setting for LDAP authentication to false, enabling LDAP servers that allow anonymous or unauthenticated binds to be used for authentication. This flaw allows attackers who can influence Terraform configuration to obtain authenticated access that was not intended, compromising confidentiality and integrity of the Vault secrets stored by the provider.

Affected Systems

The vulnerability affects the HashiCorp Vault Terraform Provider before version 5.5.0. Any deployments using Terraform to provision Vault resources with the LDAP auth method and relying on the default deny_null_bind setting are potentially impacted. The issue was addressed in release 5.5.0 of the provider.

Risk and Exploitability

The flaw carries a CVSS metric of 7.4, indicating a high severity. The EPSS score is below one percent, suggesting exploitation is currently unlikely but still possible in a determined threat scenario. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the attacker to have influence over Terraform configurations and the target environment must use an LDAP server that permits anonymous or unauthenticated binds. When both conditions are present, the attacker can bypass authentication controls and gain privileged access.

Generated by OpenCVE AI on April 20, 2026 at 15:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Vault Terraform Provider to at least version 5.5.0, which fixes the default deny_null_bind setting.
  • Explicitly set deny_null_bind = true in Terraform modules that enable LDAP authentication to ensure unauthenticated binds are rejected.
  • Verify that the underlying LDAP server does not allow anonymous binds and restrict access to only authorized clients.

Generated by OpenCVE AI on April 20, 2026 at 15:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-gmm6-j2g5-r52m Vault’s Terraform Provider incorrectly set default deny_null_bind parameter for LDAP auth method to false by default
History

Wed, 10 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hashicorp:terraform_provider:*:*:*:*:*:vault:*:*

Mon, 24 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Hashicorp
Hashicorp terraform Provider
Vendors & Products Hashicorp
Hashicorp terraform Provider

Fri, 21 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Description Vault’s Terraform Provider incorrectly set the default deny_null_bind parameter for the LDAP auth method to false by default, potentially resulting in an insecure configuration. If the underlying LDAP server allowed anonymous or unauthenticated binds, this could result in authentication bypass. This vulnerability, CVE-2025-13357, is fixed in Vault Terraform Provider v5.5.0.
Title Vault Terraform Provider Applied Incorrect Defaults for LDAP Auth Method
Weaknesses CWE-1188
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Hashicorp Terraform Provider
cve-icon MITRE

Status: PUBLISHED

Assigner: HashiCorp

Published:

Updated: 2026-04-17T17:57:56.094Z

Reserved: 2025-11-18T15:38:23.306Z

Link: CVE-2025-13357

cve-icon Vulnrichment

Updated: 2025-11-21T15:30:54.628Z

cve-icon NVD

Status : Analyzed

Published: 2025-11-21T15:15:51.313

Modified: 2025-12-10T21:00:48.097

Link: CVE-2025-13357

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:00:10Z

Weaknesses