CVE-2026-39396: Resource Exhaustion via Decompression Bomb in OpenBao OCI Plugin Downloader
Vulnerability ID: CVE-2026-39396
CVSS Score: 3.1
Published: 2026-04-21
OpenBao versions prior to 2.5.3 are vulnerable to a resource exhaustion denial-of-service (DoS) flaw due to unbounded disk writes during OCI plugin extraction. A crafted container image served from a compromised registry acts as a decompression bomb, exhausting host disk space when OpenBao streams the data directly to disk without enforcing size limits.
TL;DR
Unbounded io.Copy operations in OpenBao's OCI plugin extraction allow decompression bombs to exhaust host disk space. The flaw was remediated in version 2.5.3 by implementing io.LimitReader and strict extraction size validations.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-400 / CWE-770
- Attack Vector: Network (Via Registry)
- CVSS Score: 3.1 (Low)
- EPSS Score: 0.00033
- Impact: Denial of Service (Disk Exhaustion)
- Exploit Status: Proof of Concept
- KEV Status: Not Listed
Affected Systems
- OpenBao OCI Plugin Downloader (< 2.5.3)
-
OpenBao: < 2.5.3 (Fixed in:
2.5.3)
Code Analysis
Commit: af576af
Fix decompression bomb vulnerability in plugin OCI extraction by implementing io.LimitReader and size constraints.
Mitigation Strategies
- Upgrade OpenBao to version 2.5.3 or later to inherit the io.LimitReader extraction protections.
- Configure the
plugin_download_max_sizeparameter in the server settings to enforce a strict upper limit on plugin binaries. - Restrict OpenBao's OCI plugin downloader functionality to interface solely with trusted, internally controlled container registries.
- Implement persistent volume isolation for OpenBao cache directories to prevent cache exhaustion from impacting system-critical disk partitions.
Remediation Steps:
- Verify the current OpenBao version utilizing the administrative command line interface.
- Download the verified OpenBao 2.5.3 binary from the official release repository.
- Update the primary server configuration file to include an explicit
plugin_download_max_sizeattribute tailored to operational requirements. - Restart the OpenBao service to apply the updated binary and configuration constraints.
- Monitor application logs post-deployment for
file size was different than reported in tar headererrors indicating rejected payloads.
References
Read the full report for CVE-2026-39396 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)