Impact
A missing authorization check in the get_org_collections_details endpoint of Vaultwarden allows any user with Manager role but no collection assignments to request collection metadata. The flaw exposes collection names, UUIDs, user-to-collection mappings, and group-to-collection mappings for all collections in an organization, giving attackers insight into the structure and potentially sensitive grouping of records. The weakness is classified as CWE-862 (Missing Authorization Check).
Affected Systems
The vulnerability affects Vaultwarden versions 1.35.4 and earlier, developed by dani-garcia. Users running these releases in any organization with Manager‑role users are at risk.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate impact. No EPSS score is available and the flaw is not listed in the CISA KEV catalog. The attack vector is an authenticated user who holds Manager privileges; no external network access or elevated privileges beyond the role are required. An attacker could enumerate collection details and map organizational structure, potentially aiding future targeting or data exfiltration.
OpenCVE Enrichment