Untriaged
Permalink
CVE-2026-27898
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
Vaultwarden: Unauthorized Access via Partial Update API on Another User’s Cipher
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, an authenticated regular user can specify another user’s cipher_id and call "PUT /api/ciphers/{id}/partial" Even though the standard retrieval API correctly denies access to that cipher, the partial update endpoint returns 200 OK and exposes cipherDetails (including name, notes, data, secureNote, etc.). This issue has been patched in version 1.35.4.
References
Affected products
vaultwarden
- ==< 1.35.4
Matching in nixpkgs
pkgs.vaultwarden
Unofficial Bitwarden compatible server written in Rust
pkgs.vaultwarden-mysql
Unofficial Bitwarden compatible server written in Rust
pkgs.vaultwarden-sqlite
Unofficial Bitwarden compatible server written in Rust
pkgs.vaultwarden-webvault
Integrates the web vault into vaultwarden
-
nixos-unstable 2026.1.1+0
- nixpkgs-unstable 2026.1.1+0
- nixos-unstable-small 2026.1.1+0
Package maintainers
-
@SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>