CVE-2024-56335

7.6 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers with admin/owner permissions in one organization to modify or delete groups in other organizations if they know the target organization and group UUIDs. It affects Vaultwarden servers with ORG_GROUPS_ENABLED setting enabled, which is disabled by default. Attackers can cause denial of service by removing user group memberships or escalate privileges within victim organizations.

💻 Affected Systems

Products:
  • vaultwarden (formerly bitwarden_rs)
Versions: All versions before 1.32.7
Operating Systems: All platforms running vaultwarden
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when ORG_GROUPS_ENABLED setting is explicitly enabled (disabled by default). Requires attacker to have admin/owner permissions in at least one organization and know target organization/group UUIDs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker with internal access can disrupt organizational access by deleting groups and potentially escalate privileges to access encrypted data they shouldn't have access to within compromised organizations.

🟠

Likely Case

Internal attacker with admin rights in one organization abuses permissions to disrupt operations in another organization by modifying group memberships, causing access issues for legitimate users.

🟢

If Mitigated

With ORG_GROUPS_ENABLED disabled (default) or proper access controls, the vulnerability cannot be exploited and organizational data remains protected.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated user with specific permissions and knowledge of target UUIDs. No public exploit code identified in advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.32.7

Vendor Advisory: https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-g65h-982x-4m5m

Restart Required: Yes

Instructions:

1. Backup your vaultwarden data and configuration. 2. Stop the vaultwarden service. 3. Update to version 1.32.7 or later using your deployment method (Docker, package manager, or source). 4. Restart the vaultwarden service. 5. Verify the version is 1.32.7 or higher.

🔧 Temporary Workarounds

Disable organization groups

all

Disables the vulnerable group functionality entirely by setting ORG_GROUPS_ENABLED to false

Set ORG_GROUPS_ENABLED=false in your vaultwarden environment configuration

Disable new user signups

all

Prevents attackers from creating new accounts by disabling SIGNUPS_ALLOWED

Set SIGNUPS_ALLOWED=false in your vaultwarden environment configuration

🧯 If You Can't Patch

  • Disable ORG_GROUPS_ENABLED setting immediately to remove vulnerable functionality
  • Implement strict access controls and monitor for unauthorized group modifications in logs

🔍 How to Verify

Check if Vulnerable:

Check if vaultwarden version is below 1.32.7 AND ORG_GROUPS_ENABLED is set to true in configuration

Check Version:

docker exec vaultwarden /vaultwarden --version or check web admin interface version

Verify Fix Applied:

Confirm vaultwarden version is 1.32.7 or higher using version check command and verify ORG_GROUPS_ENABLED setting if still enabled

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized group modification attempts
  • Group deletion events from users not in target organization
  • Failed permission checks for group operations

Network Indicators:

  • API calls to group endpoints from unauthorized sources
  • Unusual pattern of group modification requests

SIEM Query:

vaultwarden AND ("group" AND ("update" OR "delete")) AND NOT organization_id:[authorized_org_ids]

🔗 References

📤 Share & Export