CVE-2026-27801
Received Received - Intake
FA Bypass in Vaultwarden Allows Unauthorized Protected Actions

Publication date: 2026-03-04

Last updated on: 2026-03-06

Assigner: GitHub, Inc.

Description
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access to a user’s account can exploit this bypass to perform protected actions such as accessing the user’s API key or deleting the user’s vault and organisations the user is an admin/owner of . This issue has been patched in version 1.35.0.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-04
Last Modified
2026-03-06
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
dani-garcia vaultwarden to 1.35.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-307 The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Vaultwarden versions 1.34.3 and earlier. Vaultwarden is an unofficial Bitwarden compatible server written in Rust. The issue is a two-factor authentication (2FA) bypass that occurs when performing protected actions.

An attacker who already has authenticated access to a user’s account can exploit this bypass to perform sensitive actions without completing the 2FA step. These actions include accessing the user’s API key or deleting the user’s vault and any organisations where the user is an admin or owner.

This vulnerability was fixed in version 1.35.0 of Vaultwarden.


How can this vulnerability impact me? :

If an attacker gains authenticated access to your Vaultwarden account, they can bypass the two-factor authentication protection to perform critical actions.

  • They could access your API key, potentially allowing further unauthorized access or integration misuse.
  • They could delete your vault, resulting in loss of stored passwords and sensitive data.
  • They could delete organisations where you have admin or owner privileges, disrupting access and management for multiple users.

Overall, this vulnerability can lead to significant data loss, unauthorized access, and disruption of services.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade Vaultwarden to version 1.35.0 or later, as this version contains the patch that fixes the 2FA bypass issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart