Description
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long as they have access to the collection. This issue has been patched in version 1.35.4.
Published: 2026-03-04
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

The vulnerability is a broken access control flaw that allows users with a Manager role to execute collection management operations even when their manage flag is set to false. The flaw enables unauthorized collection creation, modification, deletion, and membership changes, effectively granting elevated rights within the Vaultwarden instance. The weakness corresponds to several CWE identifiers related to inadequate privilege checks and improper authorization, specifically CWE-266, CWE-269, CWE-285, and CWE-863, yielding a high severity impact.

Affected Systems

Any instance of Vaultwarden by dani-garcia running a version earlier than 1.35.4 is affected. The issue exists in all deployments where a Manager role is configured without proper verification of the manage flag. The vulnerability was addressed in the 1.35.4 release and later versions. Vendors and users should verify that they are not running a vulnerable version by checking the current package revision.

Risk and Exploitability

The CVSS score of 8.3 classifies this flaw as high severity, while the EPSS score of less than 1% indicates a low but nonzero likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog, suggesting no publicly known exploits. The attack vector is likely via authenticated API requests, requiring a pre‑existing Manager role. An attacker who compromises such a credential can exploit the collection management loophole to expand their authority, modify or delete data, and potentially facilitate further lateral movement. Given the severity and privileged access involved, the risk is considered significant, especially for systems exposing the API or sharing manager accounts.

Generated by OpenCVE AI on April 16, 2026 at 13:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Vaultwarden to version 1.35.4 or later to enforce proper manage flag checks.
  • Review all Manager role assignments and remove or restrict the manage flag for collections that do not require full control.
  • Audit access logs for anomalous collection operations to detect any residual abuse before the upgrade.
  • Implement role‑based access controls with least privilege, ensuring that Manager roles are only granted when absolutely necessary.

Generated by OpenCVE AI on April 16, 2026 at 13:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h4hq-rgvh-wh27 Vaultwarden's Collection Management Operations Allowed Without `manage` Verification for Manager Role
History

Fri, 06 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:dani-garcia:vaultwarden:*:*:*:*:*:*:*:*

Thu, 05 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-266
References
Metrics threat_severity

None

threat_severity

Important


Thu, 05 Mar 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Dani-garcia
Dani-garcia vaultwarden
Vendors & Products Dani-garcia
Dani-garcia vaultwarden

Wed, 04 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long as they have access to the collection. This issue has been patched in version 1.35.4.
Title Vaultwarden: Collection Management Operations Allowed Without `manage` Verification for Manager Role
Weaknesses CWE-269
CWE-285
CWE-863
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


Subscriptions

Dani-garcia Vaultwarden
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-05T15:42:36.935Z

Reserved: 2026-02-24T02:31:33.266Z

Link: CVE-2026-27803

cve-icon Vulnrichment

Updated: 2026-03-05T15:32:47.918Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-04T22:16:18.210

Modified: 2026-03-06T19:45:27.070

Link: CVE-2026-27803

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-04T21:40:33Z

Links: CVE-2026-27803 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T13:15:06Z