{"id":"CVE-2026-33757","summary":"OpenBao lacks user confirmation for OIDC direct callback mode","details":"OpenBao is an open source identity-based secrets management system. Prior to version 2.5.2, OpenBao does not prompt for user confirmation when logging in via JWT/OIDC and a role with `callback_mode` set to `direct`. This allows an attacker to start an authentication request and perform \"remote phishing\" by having the victim visit the URL and automatically log-in to the session of the attacker. Despite being based on the authorization code flow, the  `direct` mode calls back directly to the API and allows an attacker to poll for an OpenBao token until it is issued. Version 2.5.2 includes an additional confirmation screen for `direct` type logins that requires manual user interaction in order to finish the authentication. This issue can be worked around either by removing any roles with `callback_mode=direct` or enforcing confirmation for every session on the token issuer side for the Client ID used by OpenBao.","aliases":["GHSA-7q7g-x6vg-xpc3","GO-2026-4860"],"modified":"2026-04-10T05:42:55.385346Z","published":"2026-03-27T14:10:58.639Z","related":["SUSE-SU-2026:1135-1","openSUSE-SU-2026:10438-1"],"database_specific":{"cna_assigner":"GitHub_M","cwe_ids":["CWE-384"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33757.json"},"references":[{"type":"WEB","url":"https://datatracker.ietf.org/doc/html/rfc8628#section-5.4"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33757.json"},{"type":"FIX","url":"https://github.com/openbao/openbao/commit/e32103951925723e9787e33886ab6b6ec20f4964"},{"type":"ADVISORY","url":"https://github.com/openbao/openbao/security/advisories/GHSA-7q7g-x6vg-xpc3"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33757"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openbao/openbao","events":[{"introduced":"0"},{"fixed":"932fcf892eba8d646a9bfc58a59ea3b2475b17fa"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.5.2"}]}}],"versions":["api/auth/approle/v0.1.0","api/auth/approle/v0.1.1","api/auth/approle/v0.2.0","api/auth/approle/v0.3.0","api/auth/approle/v0.4.0","api/auth/approle/v0.4.1","api/auth/approle/v1.1.0-development20240408","api/auth/approle/v2.0.1","api/auth/approle/v2.2.0","api/auth/approle/v2.3.0","api/auth/approle/v2.4.0","api/auth/approle/v2.5.0","api/auth/approle/v2.5.1","api/auth/aws/v0.1.0","api/auth/aws/v0.2.0","api/auth/aws/v0.3.0","api/auth/aws/v0.4.0","api/auth/aws/v0.4.1","api/auth/aws/v1.1.0-development20240408","api/auth/azure/v0.1.0","api/auth/azure/v0.2.0","api/auth/azure/v0.3.0","api/auth/azure/v0.4.0","api/auth/azure/v0.4.1","api/auth/azure/v1.1.0-development20240408","api/auth/gcp/v0.1.0","api/auth/gcp/v0.2.0","api/auth/gcp/v0.3.0","api/auth/gcp/v0.4.0","api/auth/gcp/v0.4.1","api/auth/gcp/v1.1.0-development20240408","api/auth/jwt/v2.4.0","api/auth/jwt/v2.5.0","api/auth/jwt/v2.5.1","api/auth/kubernetes/v1.1.0-development20240408","api/auth/kubernetes/v2.0.1","api/auth/kubernetes/v2.2.0","api/auth/kubernetes/v2.3.0","api/auth/kubernetes/v2.4.0","api/auth/kubernetes/v2.5.0","api/auth/kubernetes/v2.5.1","api/auth/ldap/v1.1.0-development20240408","api/auth/ldap/v2.0.1","api/auth/ldap/v2.2.0","api/auth/ldap/v2.3.0","api/auth/ldap/v2.4.0","api/auth/ldap/v2.5.0","api/auth/ldap/v2.5.1","api/auth/userpass/v0.1.0","api/auth/userpass/v0.2.0","api/auth/userpass/v0.3.0","api/auth/userpass/v0.4.0","api/auth/userpass/v0.4.1","api/auth/userpass/v1.1.0-development20240408","api/auth/userpass/v2.0.1","api/auth/userpass/v2.2.0","api/auth/userpass/v2.3.0","api/auth/userpass/v2.4.0","api/auth/userpass/v2.5.0","api/auth/userpass/v2.5.1","api/v1.0.1","api/v1.0.2","api/v1.0.3","api/v1.0.4","api/v1.1.1","api/v1.100.0-development20240408","api/v1.2.0","api/v1.3.1","api/v1.5.0","api/v1.6.0","api/v1.7.0","api/v1.7.1","api/v1.7.2","api/v1.8.0","api/v1.8.1","api/v1.8.2","api/v1.8.3","api/v1.9.0","api/v1.9.1","api/v1.9.2","api/v2.0.1","api/v2.1.0","api/v2.2.0","api/v2.3.0","api/v2.4.0","api/v2.5.0","api/v2.5.1","before-plugin-removal","dev-namespaces-base-20250215","dev-namespaces-base-20250311","dev-namespaces-base-20250424","sdk/v0.1.10","sdk/v0.1.11","sdk/v0.1.12","sdk/v0.1.13","sdk/v0.1.8","sdk/v0.1.9","sdk/v0.2.1","sdk/v0.3.0","sdk/v0.4.1","sdk/v0.5.0","sdk/v0.5.1","sdk/v0.5.3","sdk/v0.6.0","sdk/v0.6.1","sdk/v0.6.2","sdk/v0.7.0","sdk/v0.8.0","sdk/v0.9.0","sdk/v0.9.1","sdk/v1.100.0-development20240408","sdk/v2.0.1","sdk/v2.1.0","sdk/v2.2.0","sdk/v2.3.0","sdk/v2.4.0","sdk/v2.5.0","sdk/v2.5.1","v2.0.0","v2.0.0-alpha20240329","v2.0.0-beta20240618","v2.1.0-beta20241114","v2.1.0-beta20241114.1","v2.1.0-beta20241114.2","v2.1.0-beta20241114.3","v2.2.0-beta20250213","v2.3.0-beta20250528","v2.4.0","v2.5.0","v2.5.0-beta20251125","v2.5.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33757.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L"}]}