Description
Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.5, refresh tokens are not invalidated when the user's security_stamp is rotated by some security-sensitive operations (password change, KDF change, key rotation, email change, org admin password reset, emergency access takeover). This allows an attacker holding a previously obtained refresh token to maintain session access even after the user has taken action to secure their account. This vulnerability is fixed in 1.35.5.
Problem types
CWE-613: Insufficient Session Expiration
Product status
References
github.com/...warden/security/advisories/GHSA-6j4w-g4jh-xjfx
github.com/...warden/security/advisories/GHSA-6j4w-g4jh-xjfx