CVE-2025-24364

7.2 HIGH

📋 TL;DR

Authenticated attackers with admin panel access to vaultwarden can execute arbitrary system commands through a crafted favicon image when using sendmail configuration. This affects all vaultwarden instances with admin panel enabled and vulnerable versions. The vulnerability allows remote code execution on the server.

💻 Affected Systems

Products:
  • vaultwarden (formerly bitwarden_rs)
Versions: All versions before 1.33.0
Operating Systems: All platforms running vaultwarden
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin panel access and sendmail configuration capability. Default installations with admin panel enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attacker to steal all password vaults, install persistent backdoors, pivot to other systems, and potentially access sensitive data across the network.

🟠

Likely Case

Attacker gains shell access to the vaultwarden server, can exfiltrate password vaults, modify configurations, and potentially access other services on the same host.

🟢

If Mitigated

With proper network segmentation and admin panel access controls, impact limited to vaultwarden service disruption and potential credential exposure.

🌐 Internet-Facing: HIGH if admin panel exposed to internet, as authenticated attackers can achieve RCE.
🏢 Internal Only: MEDIUM to HIGH depending on internal network segmentation and admin access controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated admin access, specific configuration changes, and crafted favicon image. Multiple steps needed for successful exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.33.0

Vendor Advisory: https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4

Restart Required: No

Instructions:

1. Backup your vaultwarden data. 2. Update to version 1.33.0 or later using your deployment method (Docker, manual install, package manager). 3. Verify the update completed successfully. 4. Test basic functionality.

🔧 Temporary Workarounds

Disable Admin Panel

all

Disable the admin panel interface to prevent authenticated attackers from accessing the vulnerable functionality.

Set ADMIN_TOKEN environment variable to empty or remove ADMIN_TOKEN from configuration

Restrict Admin Panel Access

linux

Limit admin panel access to trusted IP addresses only using firewall rules or reverse proxy configurations.

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT

🧯 If You Can't Patch

  • Disable admin panel completely by removing ADMIN_TOKEN from configuration
  • Implement strict network segmentation to isolate vaultwarden server from other critical systems

🔍 How to Verify

Check if Vulnerable:

Check vaultwarden version. If version is below 1.33.0 and admin panel is enabled, system is vulnerable.

Check Version:

docker exec vaultwarden vaultwarden --version or check web interface footer

Verify Fix Applied:

Verify vaultwarden version is 1.33.0 or higher. Test admin panel functionality to ensure it works without allowing command injection.

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin panel access patterns
  • Configuration changes to mail settings
  • Unexpected process execution from vaultwarden context
  • Failed attempts to upload or process favicon images

Network Indicators:

  • Unusual outbound connections from vaultwarden server
  • SMTP traffic from vaultwarden to unexpected destinations

SIEM Query:

source="vaultwarden" AND (event="admin_login" OR event="config_change" OR event="mail_test")

🔗 References

📤 Share & Export