๐Ÿ” CVE Alert

CVE-2026-43640

HIGH 8.1

Bitwarden Server < 2026.4.1 Authentication Bypass via SCIM API Key

CVSS Score
8.1
EPSS Score
0.0%
EPSS Percentile
0th

Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid session.

CWE CWE-303
Vendor bitwarden
Product server
Published May 11, 2026
Last Updated May 13, 2026
Stay Ahead of the Next One

Get instant alerts for bitwarden server

Be the first to know when new high vulnerabilities affecting bitwarden server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

bitwarden / server
0 < 2026.4.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
sanjokkarki.com.np: https://sanjokkarki.com.np/blog/bitwarden-scim-key-bypass github.com: https://github.com/bitwarden/server/releases/tag/v2026.4.1 github.com: https://github.com/bitwarden/server/pull/7403 github.com: https://github.com/bitwarden/server/commit/eb251d9bf80724c87b187661783b9354d1784083 vulncheck.com: https://www.vulncheck.com/advisories/bitwarden-server-authentication-bypass-via-scim-api-key

Credits

Sanjok Karki