Vaultwarden

10 CVEs product

Monthly

CVE-2026-27898 MEDIUM PATCH This Month

Vaultwarden versions up to 1.35.4 is affected by authorization bypass through user-controlled key (CVSS 5.4).

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVSS 3.1
5.4
EPSS
0.0%
CVE-2026-27803 HIGH PATCH This Week

Vaultwarden versions prior to 1.35.4 fail to properly enforce collection management permissions, allowing authenticated users with Manager roles to perform restricted management operations on collections where they lack authorization. An attacker with valid credentials can exploit this privilege escalation to modify or control collections they should not have access to. No patch is currently available for affected deployments.

Privilege Escalation Vaultwarden Redhat
NVD GitHub
CVSS 3.1
8.3
EPSS
0.0%
CVE-2026-27802 HIGH PATCH This Week

Vaultwarden versions before 1.35.4 contain a privilege escalation vulnerability that allows authenticated Manager-level users to modify permissions on collections they should not have access to. An attacker with Manager role can exploit this during bulk permission updates to gain unauthorized access to sensitive collections. A patch is available in version 1.35.4 and should be applied immediately.

Privilege Escalation Vaultwarden Redhat
NVD GitHub
CVSS 3.1
8.3
EPSS
0.0%
CVE-2026-27801 MEDIUM POC PATCH This Month

Two-factor authentication bypass in Vaultwarden 1.34.3 and earlier allows authenticated attackers to circumvent 2FA protections on sensitive operations, enabling unauthorized access to API keys and destructive actions against vaults and organizations. Public exploit code exists for this vulnerability, which affects the unofficial Bitwarden-compatible server and currently lacks an available patch. Attackers with legitimate account credentials can escalate privileges to perform administrative actions typically restricted by 2FA controls.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVSS 3.1
5.9
EPSS
0.0%
CVE-2026-26012 MEDIUM This Month

Vaultwarden versions prior to 1.35.3 allow authenticated organization members to bypass collection-level access controls and retrieve all ciphers within their organization through the /ciphers/organization-details endpoint. An attacker with regular member privileges can access sensitive credentials and encrypted data they should not have permission to view. No patch is currently available for affected deployments.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVSS 3.1
6.5
EPSS
0.0%
CVE-2025-24365 HIGH POC This Week

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Vaultwarden
NVD GitHub
CVSS 3.1
8.1
EPSS
0.5%
CVE-2025-24364 HIGH POC This Month

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

RCE Vaultwarden
NVD GitHub
CVSS 3.1
7.2
EPSS
0.9%
CVE-2024-55226 MEDIUM POC PATCH This Month

Vaultwarden v1.32.5 was discovered to contain an authenticated reflected cross-site scripting (XSS) vulnerability via the component /api/core/mod.rs. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Vaultwarden
NVD GitHub
CVSS 3.1
5.4
EPSS
0.2%
CVE-2024-55225 CRITICAL PATCH This Week

An issue in the component src/api/identity.rs of Vaultwarden prior to v1.32.5 allows attackers to impersonate users, including Administrators, via a crafted authorization request. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Privilege Escalation Vaultwarden
NVD GitHub
CVSS 3.1
9.8
EPSS
0.3%
CVE-2024-55224 CRITICAL POC PATCH Act Now

An HTML injection vulnerability in Vaultwarden prior to v1.32.5 allows attackers to execute arbitrary code via injecting a crafted payload into the username field of an e-mail message. Rated critical severity (CVSS 9.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

RCE XSS Vaultwarden
NVD GitHub
CVSS 3.1
9.6
EPSS
0.4%
CVE-2026-27898
EPSS 0% CVSS 5.4
MEDIUM PATCH This Month

Vaultwarden versions up to 1.35.4 is affected by authorization bypass through user-controlled key (CVSS 5.4).

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVE-2026-27803
EPSS 0% CVSS 8.3
HIGH PATCH This Week

Vaultwarden versions prior to 1.35.4 fail to properly enforce collection management permissions, allowing authenticated users with Manager roles to perform restricted management operations on collections where they lack authorization. An attacker with valid credentials can exploit this privilege escalation to modify or control collections they should not have access to. No patch is currently available for affected deployments.

Privilege Escalation Vaultwarden Redhat
NVD GitHub
CVE-2026-27802
EPSS 0% CVSS 8.3
HIGH PATCH This Week

Vaultwarden versions before 1.35.4 contain a privilege escalation vulnerability that allows authenticated Manager-level users to modify permissions on collections they should not have access to. An attacker with Manager role can exploit this during bulk permission updates to gain unauthorized access to sensitive collections. A patch is available in version 1.35.4 and should be applied immediately.

Privilege Escalation Vaultwarden Redhat
NVD GitHub
CVE-2026-27801
EPSS 0% CVSS 5.9
MEDIUM POC PATCH This Month

Two-factor authentication bypass in Vaultwarden 1.34.3 and earlier allows authenticated attackers to circumvent 2FA protections on sensitive operations, enabling unauthorized access to API keys and destructive actions against vaults and organizations. Public exploit code exists for this vulnerability, which affects the unofficial Bitwarden-compatible server and currently lacks an available patch. Attackers with legitimate account credentials can escalate privileges to perform administrative actions typically restricted by 2FA controls.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVE-2026-26012
EPSS 0% CVSS 6.5
MEDIUM This Month

Vaultwarden versions prior to 1.35.3 allow authenticated organization members to bypass collection-level access controls and retrieve all ciphers within their organization through the /ciphers/organization-details endpoint. An attacker with regular member privileges can access sensitive credentials and encrypted data they should not have permission to view. No patch is currently available for affected deployments.

Authentication Bypass Vaultwarden Redhat
NVD GitHub
CVE-2025-24365
EPSS 1% CVSS 8.1
HIGH POC This Week

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Rated high severity (CVSS 8.1), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

Authentication Bypass Vaultwarden
NVD GitHub
CVE-2025-24364
EPSS 1% CVSS 7.2
HIGH POC This Month

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Rated high severity (CVSS 7.2), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

RCE Vaultwarden
NVD GitHub
CVE-2024-55226
EPSS 0% CVSS 5.4
MEDIUM POC PATCH This Month

Vaultwarden v1.32.5 was discovered to contain an authenticated reflected cross-site scripting (XSS) vulnerability via the component /api/core/mod.rs. Rated medium severity (CVSS 5.4), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available and no vendor patch available.

XSS Vaultwarden
NVD GitHub
CVE-2024-55225
EPSS 0% CVSS 9.8
CRITICAL PATCH This Week

An issue in the component src/api/identity.rs of Vaultwarden prior to v1.32.5 allows attackers to impersonate users, including Administrators, via a crafted authorization request. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Privilege Escalation Vaultwarden
NVD GitHub
CVE-2024-55224
EPSS 0% CVSS 9.6
CRITICAL POC PATCH Act Now

An HTML injection vulnerability in Vaultwarden prior to v1.32.5 allows attackers to execute arbitrary code via injecting a crafted payload into the username field of an e-mail message. Rated critical severity (CVSS 9.6), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

RCE XSS Vaultwarden
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy