Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-43914— Vaultwarden: Brute-force protection bypass vulnerability

CVSS 7.3 · High EPSS 0.04% · P11

Affected Version Matrix 1

VendorProductVersion RangeStatus
dani-garciavaultwarden< 1.35.4affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-43914

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Vaultwarden: Brute-force protection bypass vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.4, there is a security vulnerability in Vaultwarden that allows bypassing the login brute-force protection if email 2fa is enabled. If email 2fa is enabled, the unprotected 2fa-function send_email_login (email.rs, api endpoint /api/two-factor/send-email-login) also acts as an oracle determining whether a username-password combination is correct. An attacker can abuse that endpoint to brute-force passwords without rate-limiting. This works even for users who don't have email 2fa configured. This vulnerability is fixed in 1.35.4.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
过多认证尝试的限制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vaultwarden 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vaultwarden是Daniel García个人开发者的一个用 Rust 编写的 Bitwarden 服务器 API 的替代实现。 Vaultwarden 1.35.4之前版本存在安全漏洞,该漏洞源于如果启用电子邮件双因素认证,则允许绕过登录暴力破解保护,未受保护的双因素功能send_email_login也充当判断用户名密码组合是否正确的预言机,攻击者可滥用该端点无速率限制地暴力破解密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
dani-garciavaultwarden < 1.35.4 -

II. Public POCs for CVE-2026-43914

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-43914

登录查看更多情报信息。

Same Patch Batch · dani-garcia · 2026-05-11 · 4 CVEs total

CVE-2026-439128.7 HIGHVaultwarden: Cross-Org Group Binding Enables Unauthorized Read And Write Access Into Anoth
CVE-2026-439138.1 HIGHVaultwarden: Unconfirmed Owner Can Purge Entire Organization Vault
CVE-2026-439116.8 MEDIUMVaultwarden: Refresh tokens not invalidated on security stamp rotation

IV. Related Vulnerabilities

V. Comments for CVE-2026-43914

No comments yet


Leave a comment