CVE-2026-27898

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated regular users in Vaultwarden to access other users' encrypted password vault entries by exploiting an authorization bypass in the partial update API endpoint. Attackers can read sensitive data including passwords, secure notes, and other stored credentials. Only Vaultwarden instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Vaultwarden (formerly bitwarden_rs)
Versions: All versions prior to 1.35.4
Operating Systems: All platforms running Vaultwarden
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with authenticated users are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious authenticated users could systematically exfiltrate all password vault data from all users, leading to complete credential compromise and potential account takeovers across multiple services.

🟠

Likely Case

An attacker with regular user access could access specific targeted users' password vault entries, potentially compromising sensitive personal or organizational credentials.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized access attempts would be detected and blocked, limiting exposure to targeted attacks.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via API manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.35.4

Vendor Advisory: https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-w9f8-m526-h7fh

Restart Required: Yes

Instructions:

1. Stop Vaultwarden service. 2. Update to version 1.35.4 or later. 3. Restart Vaultwarden service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable partial update endpoint

all

Temporarily disable the vulnerable API endpoint until patching is possible

Modify Vaultwarden configuration to block PUT requests to /api/ciphers/*/partial

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to Vaultwarden API endpoints
  • Enhance monitoring and alerting for unusual API access patterns to /api/ciphers/*/partial

🔍 How to Verify

Check if Vulnerable:

Check Vaultwarden version via web interface or container image tag. Versions below 1.35.4 are vulnerable.

Check Version:

docker inspect vaultwarden/server | grep -i version

Verify Fix Applied:

Confirm version is 1.35.4 or higher and test that authenticated users cannot access other users' cipher data via the partial update endpoint.

📡 Detection & Monitoring

Log Indicators:

  • Multiple 200 OK responses to PUT /api/ciphers/{id}/partial with different cipher IDs from same user
  • Unusual access patterns to cipher endpoints

Network Indicators:

  • Unusual volume of PUT requests to /api/ciphers/*/partial endpoints
  • API calls accessing cipher IDs not belonging to the authenticated user

SIEM Query:

source="vaultwarden" AND method="PUT" AND uri="/api/ciphers/*/partial" AND status=200 | stats count by user_id, cipher_id

🔗 References

📤 Share & Export