Home

Description

Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.5, refresh tokens are not invalidated when the user's security_stamp is rotated by some security-sensitive operations (password change, KDF change, key rotation, email change, org admin password reset, emergency access takeover). This allows an attacker holding a previously obtained refresh token to maintain session access even after the user has taken action to secure their account. This vulnerability is fixed in 1.35.5.

PUBLISHED Reserved 2026-05-04 | Published 2026-05-11 | Updated 2026-05-12 | Assigner GitHub_M




MEDIUM: 6.8CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-613: Insufficient Session Expiration

Product status

< 1.35.5
affected

References

github.com/...warden/security/advisories/GHSA-6j4w-g4jh-xjfx exploit

github.com/...warden/security/advisories/GHSA-6j4w-g4jh-xjfx

cve.org (CVE-2026-43911)

nvd.nist.gov (CVE-2026-43911)

Download JSON