Authentication Bypass in VaulTLS by 7ritn
CVE-2025-55299
9.4CRITICAL
What is CVE-2025-55299?
VaulTLS, a modern solution for managing mutual TLS (mTLS) certificates, has a significant vulnerability in versions prior to 0.9.1. User accounts created through the User web UI are assigned empty but non-NULL passwords, which allows attackers to exploit this weakness and gain unauthorized access using an empty password. Additionally, the previous function to disable password-based logins affected only the frontend, leaving the API access vulnerable to exploitation. This security flaw was addressed in version 0.9.1.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
VaulTLS < 0.9.1
References
CVSS V3.1
Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
