← Zuruck zu CVEs
CVE-2026-33420
MEDIUM5.3
Beschreibung
Vaultwarden is a Bitwarden-compatible server written in Rust. In version 1.35.4 and earlier, the get_org_collections_details endpoint (GET /api/organizations/{org_id}/collections/details) is missing the has_full_access() authorization check that exists on the sibling get_org_collections endpoint. This allows any Manager-role user with accessAll=False and no collection assignments to retrieve the names, UUIDs, user-to-collection mappings, and group-to-collection mappings for all collections in the organization. This issue has been fixed in version 1.35.5.
CVE Details
CVSS v3.1 Bewertung5.3
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht5/5/2026
Zuletzt geandert5/8/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
dani-garcia:vaultwarden
Schwachen (CWE)
CWE-862
Referenzen
https://github.com/dani-garcia/vaultwarden/releases/tag/1.35.5(security-advisories@github.com)
https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-jjxg-p3v6-52ww(security-advisories@github.com)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.