CVE-2026-33758

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao installations that have an OIDC/JWT authentication method enabled and a role with `callback_mode=direct` configured are vulnerable to XSS via the `error_description` parameter on the page for a failed authentication. This allows an attacker access to the token used in the Web UI by a victim. The `error_description` parameter has been replaced with a static error message in v2.5.2. The vulnerability can be mitigated by removing any roles with `callback_mode` set to `direct`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*

History

30 Mar 2026, 17:21

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
CPE cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*
First Time Openbao openbao
Openbao
References () https://github.com/openbao/openbao/commit/6e2b2dd84f0e47cebc90d6e79609dd5274732662 - () https://github.com/openbao/openbao/commit/6e2b2dd84f0e47cebc90d6e79609dd5274732662 - Patch
References () https://github.com/openbao/openbao/pull/2709 - () https://github.com/openbao/openbao/pull/2709 - Issue Tracking, Patch
References () https://github.com/openbao/openbao/releases/tag/v2.5.2 - () https://github.com/openbao/openbao/releases/tag/v2.5.2 - Product, Release Notes
References () https://github.com/openbao/openbao/security/advisories/GHSA-cpj3-3r2f-xj59 - () https://github.com/openbao/openbao/security/advisories/GHSA-cpj3-3r2f-xj59 - Vendor Advisory

Information

Published : 2026-03-27 15:16

Updated : 2026-03-30 17:21


NVD link : CVE-2026-33758

Mitre link : CVE-2026-33758

CVE.ORG link : CVE-2026-33758


JSON object : View

Products Affected

openbao

  • openbao
CWE
CWE-20

Improper Input Validation

CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-116

Improper Encoding or Escaping of Output