CVE-2025-55299 – VaulTLS Empty Password Authentication Bypass

The following table lists the changes that have been made to the
CVE-2025-55299 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 18, 2025

    Action Type Old Value New Value
    Added Description VaulTLS is a modern solution for managing mTLS (mutual TLS) certificates. Prior to 0.9.1, user accounts created through the User web UI have an empty but not NULL password set, attackers can use this to login with an empty password. This is combined with that fact, that previously disabling the password based login only effected the frontend, but still allowed login via the API. This vulnerability is fixed in 0.9.1.
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
    Added CWE CWE-521
    Added Reference https://github.com/7ritn/VaulTLS/commit/6ac0a43a768f1753f6889ba43f914e773a4b45c0
    Added Reference https://github.com/7ritn/VaulTLS/security/advisories/GHSA-pjfr-pj3h-cw8m
Share the Post:

Related Posts