๐Ÿ” CVE Alert

CVE-2026-43914

HIGH 7.3

Vaultwarden: Brute-force protection bypass vulnerability

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.4, there is a security vulnerability in Vaultwarden that allows bypassing the login brute-force protection if email 2fa is enabled. If email 2fa is enabled, the unprotected 2fa-function send_email_login (email.rs, api endpoint /api/two-factor/send-email-login) also acts as an oracle determining whether a username-password combination is correct. An attacker can abuse that endpoint to brute-force passwords without rate-limiting. This works even for users who don't have email 2fa configured. This vulnerability is fixed in 1.35.4.

CWE CWE-307
Vendor dani-garcia
Product vaultwarden
Published May 11, 2026
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for dani-garcia vaultwarden

Be the first to know when new high vulnerabilities affecting dani-garcia vaultwarden are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

dani-garcia / vaultwarden
< 1.35.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-c5rv-q295-7w4g github.com: https://github.com/dani-garcia/vaultwarden/pull/6867 github.com: https://github.com/dani-garcia/vaultwarden/releases/tag/1.35.4