Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31835: CWE-345: Insufficient Verification of Data Authenticity in dani-garcia vaultwarden

0
Medium
VulnerabilityCVE-2026-31835cvecve-2026-31835cwe-345
Published: Tue May 05 2026 (05/05/2026, 18:51:35 UTC)
Source: CVE Database V5
Vendor/Project: dani-garcia
Product: vaultwarden

Description

Vaultwarden versions 1. 35. 4 and earlier contain a vulnerability in the WebAuthn authentication flow where persistent credential metadata flags are updated based on unverified authenticator data before signature validation. An attacker who knows a user's password but cannot produce a valid WebAuthn signature can modify these backup flags, causing a persistent denial of service of WebAuthn two-factor authentication for that user's credential. This issue is fixed in version 1. 35. 5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/05/2026, 19:21:39 UTC

Technical Analysis

In Vaultwarden (a Bitwarden-compatible server written in Rust), versions prior to 1.35.5 have a vulnerability (CWE-345) in the WebAuthn login validation function. The function updates persistent credential metadata flags (backup_eligible and backup_state) using unverified authenticatorData before the WebAuthn signature is validated. If the signature verification fails, the database update is not reverted, allowing an attacker with knowledge of the user's password but without a valid WebAuthn signature to permanently alter these flags. This can cause a persistent denial of service for WebAuthn two-factor authentication on affected credentials. The vulnerability is addressed in version 1.35.5.

Potential Impact

The vulnerability allows an attacker who knows a user's password but cannot produce a valid WebAuthn signature to permanently modify backup-related credential flags, resulting in a persistent denial of service of WebAuthn two-factor authentication for the affected user credentials. This undermines the availability of the two-factor authentication mechanism but does not directly lead to credential compromise or privilege escalation.

Mitigation Recommendations

Upgrade Vaultwarden to version 1.35.5 or later, where this issue has been fixed. Since this is a vulnerability in the application code, applying the official patch version is the recommended remediation. Patch status is confirmed by the vendor advisory stating the fix in version 1.35.5.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T17:41:56.078Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69fa3fb2cbff5d86101cd316

Added to database: 5/5/2026, 7:06:26 PM

Last enriched: 5/5/2026, 7:21:39 PM

Last updated: 5/5/2026, 8:09:56 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses