CVE-2026-31835: CWE-345: Insufficient Verification of Data Authenticity in dani-garcia vaultwarden
Vaultwarden versions 1. 35. 4 and earlier contain a vulnerability in the WebAuthn authentication flow where persistent credential metadata flags are updated based on unverified authenticator data before signature validation. An attacker who knows a user's password but cannot produce a valid WebAuthn signature can modify these backup flags, causing a persistent denial of service of WebAuthn two-factor authentication for that user's credential. This issue is fixed in version 1. 35. 5.
AI Analysis
Technical Summary
In Vaultwarden (a Bitwarden-compatible server written in Rust), versions prior to 1.35.5 have a vulnerability (CWE-345) in the WebAuthn login validation function. The function updates persistent credential metadata flags (backup_eligible and backup_state) using unverified authenticatorData before the WebAuthn signature is validated. If the signature verification fails, the database update is not reverted, allowing an attacker with knowledge of the user's password but without a valid WebAuthn signature to permanently alter these flags. This can cause a persistent denial of service for WebAuthn two-factor authentication on affected credentials. The vulnerability is addressed in version 1.35.5.
Potential Impact
The vulnerability allows an attacker who knows a user's password but cannot produce a valid WebAuthn signature to permanently modify backup-related credential flags, resulting in a persistent denial of service of WebAuthn two-factor authentication for the affected user credentials. This undermines the availability of the two-factor authentication mechanism but does not directly lead to credential compromise or privilege escalation.
Mitigation Recommendations
Upgrade Vaultwarden to version 1.35.5 or later, where this issue has been fixed. Since this is a vulnerability in the application code, applying the official patch version is the recommended remediation. Patch status is confirmed by the vendor advisory stating the fix in version 1.35.5.
CVE-2026-31835: CWE-345: Insufficient Verification of Data Authenticity in dani-garcia vaultwarden
Description
Vaultwarden versions 1. 35. 4 and earlier contain a vulnerability in the WebAuthn authentication flow where persistent credential metadata flags are updated based on unverified authenticator data before signature validation. An attacker who knows a user's password but cannot produce a valid WebAuthn signature can modify these backup flags, causing a persistent denial of service of WebAuthn two-factor authentication for that user's credential. This issue is fixed in version 1. 35. 5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
In Vaultwarden (a Bitwarden-compatible server written in Rust), versions prior to 1.35.5 have a vulnerability (CWE-345) in the WebAuthn login validation function. The function updates persistent credential metadata flags (backup_eligible and backup_state) using unverified authenticatorData before the WebAuthn signature is validated. If the signature verification fails, the database update is not reverted, allowing an attacker with knowledge of the user's password but without a valid WebAuthn signature to permanently alter these flags. This can cause a persistent denial of service for WebAuthn two-factor authentication on affected credentials. The vulnerability is addressed in version 1.35.5.
Potential Impact
The vulnerability allows an attacker who knows a user's password but cannot produce a valid WebAuthn signature to permanently modify backup-related credential flags, resulting in a persistent denial of service of WebAuthn two-factor authentication for the affected user credentials. This undermines the availability of the two-factor authentication mechanism but does not directly lead to credential compromise or privilege escalation.
Mitigation Recommendations
Upgrade Vaultwarden to version 1.35.5 or later, where this issue has been fixed. Since this is a vulnerability in the application code, applying the official patch version is the recommended remediation. Patch status is confirmed by the vendor advisory stating the fix in version 1.35.5.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-09T17:41:56.078Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69fa3fb2cbff5d86101cd316
Added to database: 5/5/2026, 7:06:26 PM
Last enriched: 5/5/2026, 7:21:39 PM
Last updated: 5/5/2026, 8:09:56 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.