CVE-2026-42994
Received Received - Intake
Malicious Code Injection in Bitwarden CLI npm Package

Publication date: 2026-05-01

Last updated on: 2026-05-04

Assigner: MITRE

Description
Bitwarden CLI 2026.4.0 from 2026-04-22T21:57Z to 2026-04-22T23:30Z, when obtained from npm, had embedded malicious code. This is related to a Checkmarx supply chain incident.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-01
Last Modified
2026-05-04
Generated
2026-05-06
AI Q&A
2026-05-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bitwarden cli 2026.4.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability involves a malicious npm package that was briefly distributed for the Bitwarden CLI version 2026.4.0 on April 22, 2026. This malicious code was embedded in the package during a supply chain incident related to Checkmarx. Only users who downloaded and installed the CLI via npm during a specific 93-minute window were affected.

The issue was limited to the npm distribution mechanism and did not affect the legitimate CLI codebase or stored vault data.


How can this vulnerability impact me? :

Users who installed the affected Bitwarden CLI version 2026.4.0 from npm during the brief window could have been exposed to malicious code embedded in the package.

However, Bitwarden confirmed that end user vault data, production systems, and production data were not compromised.

Only 334 users were affected, and regular Bitwarden users who do not use the CLI are not at risk.

Impacted users are advised to uninstall the affected version, clear the npm cache, disable npm install scripts temporarily, rotate any exposed secrets, review GitHub activity for unauthorized changes, and install the updated version 2026.4.1.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability affects users who downloaded and installed the Bitwarden CLI version 2026.4.0 via npm during a specific 93-minute window on April 22, 2026.

To detect if your system is affected, check if the Bitwarden CLI version 2026.4.0 is installed and if it was installed via npm during that time frame.

  • Run the command `bw --version` or `bitwarden --version` to check the installed CLI version.
  • Check your npm installation logs or history to see if Bitwarden CLI version 2026.4.0 was installed between 2026-04-22T21:57Z and 2026-04-22T23:30Z.
  • Use `npm list -g bitwarden` or `npm list bitwarden` to see the installed version of Bitwarden CLI.

Additionally, review GitHub activity for unauthorized changes if you use Bitwarden CLI in your development workflow.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include uninstalling the affected Bitwarden CLI version 2026.4.0.

  • Uninstall the Bitwarden CLI version 2026.4.0.
  • Clear the npm cache to remove any malicious package remnants by running `npm cache clean --force`.
  • Temporarily disable npm install scripts to prevent automatic execution of malicious code during package installation.
  • Rotate any secrets or credentials that may have been exposed.
  • Review GitHub activity for unauthorized changes if Bitwarden CLI is used in your development environment.
  • Install the updated and safe Bitwarden CLI version 2026.4.1.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involved a malicious npm package briefly distributed for Bitwarden CLI version 2026.4.0, but Bitwarden confirmed that end user vault data, production systems, and production data were not compromised.

Since no user data or production data was affected, the incident's impact on compliance with common standards and regulations such as GDPR or HIPAA is minimal or negligible.

Bitwarden took rapid remediation steps including revoking access, advising affected users to uninstall the compromised version, and implementing additional mitigations to prevent similar attacks, which supports maintaining compliance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart