CVE-2020-25864
Description
HashiCorp Consul and Consul Enterprise up to version 1.9.4 key-value (KV) raw mode was vulnerable to cross-site scripting. Fixed in 1.9.5, 1.8.10 and 1.7.14.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
HashiCorp Consul and Consul Enterprise up to 1.9.4 are vulnerable to XSS via the KV API's raw mode, allowing arbitrary script execution. Fixed in 1.9.5, 1.8.10, 1.7.14.
Vulnerability
HashiCorp Consul and Consul Enterprise versions up to and including 1.9.4 are vulnerable to cross-site scripting (XSS) in the key-value (KV) API when using the raw mode. The KV API's raw parameter serves a KV-indexed object without a JSON wrapper, making it possible to inject arbitrary HTML/JavaScript through a specially crafted key-value entry [1][3].
Exploitation
An attacker must have write access to the Consul KV store to create a malicious key-value entry containing an XSS payload. When a user (such as an administrator) accesses that key via the KV API with the raw parameter, the payload is rendered by the browser, allowing the attacker to execute arbitrary scripts in the context of the Consul web interface or endpoint [3].
Impact
Successful exploitation enables an attacker to perform arbitrary JavaScript execution in the victim's browser session, potentially leading to theft of session tokens, defacement, or further compromise of the Consul environment. The vulnerability does not directly allow remote code execution but can be leveraged for information disclosure and privilege escalation within the context of the user's session [1][3].
Mitigation
HashiCorp has released fixed versions: Consul 1.9.5, 1.8.10, and 1.7.14 [1][3][4]. Users should upgrade to one of these versions or later. There are no known workarounds for this vulnerability. The Gentoo security advisory (GLSA 202208-09) also recommends upgrading to >=app-admin/consul-1.9.17 as later versions include additional fixes [4].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/consulGo | >= 1.9.0, < 1.9.5 | 1.9.5 |
github.com/hashicorp/consulGo | >= 1.8.0, < 1.8.10 | 1.8.10 |
github.com/hashicorp/consulGo | < 1.7.14 | 1.7.14 |
Affected products
27- HashiCorp/Consul and Consul Enterprisedescription
- osv-coords26 versionspkg:apk/chainguard/consul-1.15pkg:apk/chainguard/consul-1.15-oci-entrypointpkg:apk/chainguard/consul-1.15-oci-entrypoint-compatpkg:apk/chainguard/consul-1.16pkg:apk/chainguard/consul-1.16-oci-entrypointpkg:apk/chainguard/consul-1.16-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17pkg:apk/chainguard/consul-1.17-fipspkg:apk/chainguard/consul-1.17-fips-oci-entrypointpkg:apk/chainguard/consul-1.17-fips-oci-entrypoint-compatpkg:apk/chainguard/consul-1.17-oci-entrypointpkg:apk/chainguard/consul-1.17-oci-entrypoint-compatpkg:apk/chainguard/k3dpkg:apk/chainguard/k3d-proxypkg:apk/chainguard/k3d-toolspkg:apk/wolfi/consul-1.15pkg:apk/wolfi/consul-1.15-oci-entrypointpkg:apk/wolfi/consul-1.15-oci-entrypoint-compatpkg:apk/wolfi/consul-1.16pkg:apk/wolfi/consul-1.16-oci-entrypointpkg:apk/wolfi/consul-1.16-oci-entrypoint-compatpkg:apk/wolfi/k3dpkg:apk/wolfi/k3d-proxypkg:apk/wolfi/k3d-toolspkg:bitnami/consulpkg:golang/github.com/hashicorp/consul
< 1.15.11-r5+ 25 more
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 1.15.11-r5
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 5.6.0-r11
- (no CPE)range: < 1.7.14
- (no CPE)range: >= 1.9.0, < 1.9.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-8xmx-h8rq-h94jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-25864ghsaADVISORY
- security.gentoo.org/glsa/202208-09ghsavendor-advisoryx_refsource_GENTOOWEB
- discuss.hashicorp.com/t/hcsec-2021-07-consul-api-kv-endpoint-vulnerable-to-cross-site-scripting/23368ghsax_refsource_MISCWEB
- www.hashicorp.com/blog/category/consulghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.