Vulnerability Description
vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker with authenticated access to the vaultwarden admin panel can execute arbitrary code in the system. The attacker could then change some settings to use sendmail as mail agent but adjust the settings in such a way that it would use a shell command. It then also needed to craft a special favicon image which would have the commands embedded to run during for example sending a test email. This vulnerability is fixed in 1.33.0.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dani-Garcia | Vaultwarden | < 1.33.0 |
Related Weaknesses (CWE)
References
- https://github.com/dani-garcia/vaultwarden/releases/tag/1.33.0Release Notes
- https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23ExploitVendor Advisory
FAQ
What is CVE-2025-24364?
CVE-2025-24364 is a vulnerability with a CVSS score of 7.2 (HIGH). vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker with authenticated access to the vaultwarden admin panel can execute arbitrary code i...
How severe is CVE-2025-24364?
CVE-2025-24364 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-24364?
Check the references section above for vendor advisories and patch information. Affected products include: Dani-Garcia Vaultwarden.