Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27801: CWE-307: Improper Restriction of Excessive Authentication Attempts in dani-garcia vaultwarden

0
Medium
VulnerabilityCVE-2026-27801cvecve-2026-27801cwe-307
Published: Wed Mar 04 2026 (03/04/2026, 21:32:14 UTC)
Source: CVE Database V5
Vendor/Project: dani-garcia
Product: vaultwarden

Description

CVE-2026-27801 is a medium severity vulnerability affecting Vaultwarden versions prior to 1. 35. 0, allowing a 2FA bypass on protected actions. An attacker with authenticated access to a victim's account can exploit this flaw to perform sensitive operations such as accessing the user's API key or deleting vault data and organizations where the user has admin or owner privileges. The vulnerability stems from improper restriction of excessive authentication attempts (CWE-307), enabling circumvention of two-factor authentication protections. No user interaction is required beyond initial authentication, and exploitation requires at least low privileges on the account. The issue has been patched in Vaultwarden 1. 35. 0. Organizations using vulnerable Vaultwarden instances should upgrade immediately to prevent potential account compromise and data loss.

AI-Powered Analysis

AILast updated: 03/04/2026, 22:02:49 UTC

Technical Analysis

Vaultwarden, an unofficial Bitwarden-compatible password management server written in Rust, versions 1.34.3 and earlier contain a vulnerability identified as CVE-2026-27801, categorized under CWE-307 (Improper Restriction of Excessive Authentication Attempts). This flaw allows an attacker who has already authenticated to a user account to bypass two-factor authentication (2FA) protections when performing sensitive, protected actions. Specifically, the attacker can access the victim’s API key or delete the user’s vault and any organizations where the user holds admin or owner roles. The vulnerability arises because the system does not adequately restrict or enforce 2FA challenges on these critical operations, effectively allowing a bypass once initial authentication is achieved. The CVSS 4.0 score of 6.0 reflects a medium severity, considering the attack vector is network-based, requires partial privileges (authenticated user with low privileges), and no user interaction beyond login is needed. The vulnerability does not affect confidentiality broadly but impacts integrity and availability of user data and organizational resources. The flaw was addressed and patched in Vaultwarden version 1.35.0, which enforces proper 2FA checks on protected actions, mitigating the bypass risk.

Potential Impact

The primary impact of this vulnerability is the potential compromise of user accounts and associated organizational data within Vaultwarden deployments. Attackers who gain authenticated access—potentially through credential theft, phishing, or session hijacking—can bypass 2FA protections to perform destructive or unauthorized actions such as deleting vault contents or organizations, and extracting API keys that could be used for further attacks or automation. This undermines the integrity and availability of password vault data, which is critical for organizational security. The exposure of API keys could also facilitate lateral movement or automation of malicious activities. Organizations relying on Vaultwarden for password management and secrets storage face risks of data loss, operational disruption, and potential downstream compromise of other systems relying on the stolen credentials. Since Vaultwarden is often used by small to medium enterprises and privacy-conscious users as a self-hosted alternative to Bitwarden, the impact is significant for these groups if patches are not applied promptly.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should immediately upgrade Vaultwarden to version 1.35.0 or later, where the 2FA bypass has been fixed. Additionally, administrators should audit existing user accounts for suspicious activity, especially focusing on accounts with admin or owner privileges in organizations. Implementing strict monitoring and alerting on sensitive actions such as vault deletions or API key accesses can help detect exploitation attempts. It is also advisable to enforce strong authentication policies, including the use of hardware-based 2FA tokens where possible, and to review access logs regularly. For environments where immediate upgrade is not feasible, restricting network access to Vaultwarden instances and employing additional external access controls can reduce exposure. Finally, educating users about credential security and monitoring for compromised credentials can help prevent attackers from gaining initial authenticated access.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:31:33.266Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a8a8a2d1a09e29cb7830cb

Added to database: 3/4/2026, 9:48:18 PM

Last enriched: 3/4/2026, 10:02:49 PM

Last updated: 3/4/2026, 10:50:18 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses