Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43912— Vaultwarden: Cross-Org Group Binding Enables Unauthorized Read And Write Access Into Another Organization

CVSS 8.7 · High EPSS 0.04% · P13

Affected Version Matrix 1

VendorProductVersion RangeStatus
dani-garciavaultwarden< 1.35.5affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43912

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vaultwarden: Cross-Org Group Binding Enables Unauthorized Read And Write Access Into Another Organization
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.5, Vaultwarden does not enforce that a groups_users.users_organizations_uuid entry belongs to the same organization as groups.groups_uuid, or a collections_groups.collections_uuid entry belongs to the same organization as collections_groups.groups_uuid. Multiple organization group-management endpoints accept arbitrary MembershipId and CollectionId values and persist them directly without verifying org consistency. This lets an attacker who is Admin in Organization A, and only a low-privileged member in Organization B bind their Org B membership UUID into an Org A group, then use that foreign group relationship to gain unauthorized access to Org B vault data. With an accessAll=true Org A group, the attacker can make /api/sync and /api/ciphers enumerate Org B ciphers. Once those unauthorized sync results reveal Org B collection IDs, the attacker can also bind those foreign collection IDs to the Org A group and turn the same flaw into write access over Org B items. This vulnerability is fixed in 1.35.5.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
授权机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vaultwarden 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vaultwarden是Daniel García个人开发者的一个用 Rust 编写的 Bitwarden 服务器 API 的替代实现。 Vaultwarden 1.35.5之前版本存在授权问题漏洞,该漏洞源于未强制groups_users.users_organizations_uuid条目属于与groups.groups_uuid相同的组织,或collections_groups.collections_uuid条目属于与collections_groups.groups_uuid相同的组织,多个组织
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
dani-garciavaultwarden < 1.35.5 -

II. Public POCs for CVE-2026-43912

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43912

登录查看更多情报信息。

Same Patch Batch · dani-garcia · 2026-05-11 · 4 CVEs total

CVE-2026-439138.1 HIGHVaultwarden: Unconfirmed Owner Can Purge Entire Organization Vault
CVE-2026-439147.3 HIGHVaultwarden: Brute-force protection bypass vulnerability
CVE-2026-439116.8 MEDIUMVaultwarden: Refresh tokens not invalidated on security stamp rotation

IV. Related Vulnerabilities

V. Comments for CVE-2026-43912

No comments yet


Leave a comment