Upstream information

CVE-2026-33758 at MITRE

Description

OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao installations that have an OIDC/JWT authentication method enabled and a role with `callback_mode=direct` configured are vulnerable to XSS via the `error_description` parameter on the page for a failed authentication. This allows an attacker access to the token used in the Web UI by a victim. The `error_description` parameter has been replaced with a static error message in v2.5.2. The vulnerability can be mitigated by removing any roles with `callback_mode` set to `direct`.

SUSE information

Overall state of this security issue: Does not affect SUSE products

No SUSE Bugzilla entries cross referenced.

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • openbao >= 2.5.2-1.1
  • openbao-agent >= 2.5.2-1.1
  • openbao-cassandra-database-plugin >= 2.5.2-1.1
  • openbao-influxdb-database-plugin >= 2.5.2-1.1
  • openbao-mysql-database-plugin >= 2.5.2-1.1
  • openbao-mysql-legacy-database-plugin >= 2.5.2-1.1
  • openbao-postgresql-database-plugin >= 2.5.2-1.1
  • openbao-server >= 2.5.2-1.1
Patchnames:
openSUSE-Tumbleweed-2026-10438


SUSE Timeline for this CVE

CVE page created: Fri Mar 27 01:47:25 2026
CVE page last modified: Mon Mar 30 14:07:28 2026