VYPR
High severityNVD Advisory· Published Sep 23, 2022· Updated May 27, 2025

CVE-2021-41803

CVE-2021-41803

Description

HashiCorp Consul 1.8.1 up to 1.11.8, 1.12.4, and 1.13.1 do not properly validate the node or segment names prior to interpolation and usage in JWT claim assertions with the auto config RPC. Fixed in 1.11.9, 1.12.5, and 1.13.2."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

HashiCorp Consul auto-config feature fails to validate node/segment names before JWT claim interpolation, allowing authenticated attackers to generate TLS certificates and ACL tokens for unintended nodes, leading to denial of service.

Vulnerability

Overview

CVE-2021-41803 is a missing input validation vulnerability in HashiCorp Consul's auto-config feature. The server does not properly validate node or segment names before interpolating them into JWT claim assertions during the auto-config RPC. This allows a crafted request to bypass the intended authorization checks [1][4].

Exploitation

An authenticated attacker (malicious operator) can send a specially crafted auto-config request where the node name in the request does not match the node name in the JWT claim. The server then generates TLS certificates and ACL tokens for the attacker-specified node name, rather than the one authorized by the JWT [4].

Impact

By repeatedly exploiting this flaw, an attacker can force Consul to store unintended node information, leading to an authenticated denial of service. Additionally, the ability to issue credentials for arbitrary node names may enable further unauthorized actions within the cluster [4].

Mitigation

HashiCorp has fixed this vulnerability in Consul versions 1.11.9, 1.12.5, and 1.13.2. Users relying on auto-config should upgrade to these or later versions. No workaround is available [2][4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
github.com/hashicorp/consulGo
>= 1.8.1, < 1.11.91.11.9
github.com/hashicorp/consulGo
>= 1.12.0, < 1.12.51.12.5
github.com/hashicorp/consulGo
>= 1.13.0, < 1.13.21.13.2

Affected products

5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

11

News mentions

0

No linked articles in our index yet.