Nomad Unauthenticated Client Agent HTTP Request Privilege Escalation
Description
HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
HashiCorp Nomad 1.5.0–1.5.2 allow unauthenticated users to bypass ACL authorizations when mTLS is disabled.
A vulnerability in HashiCorp Nomad and Nomad Enterprise versions 1.5.0 to 1.5.2 allows unauthenticated users to bypass intended ACL authorizations. The issue occurs when mTLS is not enabled: an unauthenticated HTTP request sent to a client agent's HTTP endpoint is processed on the server through internal RPCs without proper ACL checks [1][3].
An attacker with network access to the Nomad client agent's HTTP endpoint can exploit this by sending crafted unauthenticated requests. This bypass relies on the absence of mTLS, which is recommended for secure deployments. No authentication is required, making the attack surface accessible to any unauthenticated party on the network [3].
Successful exploitation allows the attacker to submit jobs to the cluster, effectively escalating privileges to perform actions normally restricted by ACLs. This can lead to unauthorized workload execution and potential compromise of the cluster [3].
The vulnerability is fixed in Nomad version 1.5.3. HashiCorp strongly recommends upgrading to this version or later, and enabling mTLS for all HTTP and RPC endpoints as a security best practice [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
github.com/hashicorp/nomadGo | >= 1.5.0, < 1.5.3 | 1.5.3 |
Affected products
3- HashiCorp/Nomadv5Range: 1.5.0
- HashiCorp/Nomad Enterprisev5Range: 1.5.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.