Authentication Bypass in VaulTLS by 7ritn
CVE-2025-55299

9.4CRITICAL

Key Information:

Vendor

7ritn

Status
Vendor
CVE Published:
18 August 2025

What is CVE-2025-55299?

VaulTLS, a modern solution for managing mutual TLS (mTLS) certificates, has a significant vulnerability in versions prior to 0.9.1. User accounts created through the User web UI are assigned empty but non-NULL passwords, which allows attackers to exploit this weakness and gain unauthorized access using an empty password. Additionally, the previous function to disable password-based logins affected only the frontend, leaving the API access vulnerable to exploitation. This security flaw was addressed in version 0.9.1.

Affected Version(s)

VaulTLS < 0.9.1

References

CVSS V3.1

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-55299 : Authentication Bypass in VaulTLS by 7ritn