CVE-2026-33758

CRITICAL
2026-03-26 https://github.com/openbao/openbao
9.4
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
P
Scope
X

Lifecycle Timeline

3
Analysis Generated
Mar 26, 2026 - 18:45 vuln.today
Patch Released
Mar 26, 2026 - 18:45 nvd
Patch available
CVE Published
Mar 26, 2026 - 18:37 nvd
CRITICAL 9.4

Tags

Description

### Impact OpenBao installations that have an OIDC/JWT authentication method enabled and a role with `callback_mode=direct` configured are vulnerable to XSS via the `error_description` parameter on the page for a failed authentication. This allows an attacker access to the token used in the Web UI by a victim. ### Patches The `error_description` parameter has been replaced with a static error message in v2.5.2 ### Workarounds The vulnerability can be mitigated by removing any roles with `callback_mode` set to `direct`.

Analysis

Cross-site scripting in OpenBao's OIDC/JWT authentication method allows theft of Web UI session tokens when roles are configured with callback_mode=direct. Attackers exploit the unsanitized error_description parameter on failed authentication pages to inject malicious scripts that execute in victims' browsers, granting access to authentication tokens. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: Inventory all OpenBao deployments and identify instances running versions prior to v2.5.2 with OIDC/JWT authentication enabled and callback_mode=direct configured. Within 7 days: Apply vendor patch by upgrading to OpenBao v2.5.2 or later on all affected systems. …

Sign in for detailed remediation steps.

Priority Score

47
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +47
POC: 0

Share

CVE-2026-33758 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy