Vulnerability Description
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access to a user’s account can exploit this bypass to perform protected actions such as accessing the user’s API key or deleting the user’s vault and organisations the user is an admin/owner of . This issue has been patched in version 1.35.0.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dani-Garcia | Vaultwarden | < 1.35.0 |
Related Weaknesses (CWE)
References
- https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-v6pg-v89r-w8ExploitMitigationVendor Advisory
- https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-v6pg-v89r-w8ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-27801?
CVE-2026-27801 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protecte...
How severe is CVE-2026-27801?
CVE-2026-27801 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-27801?
Check the references section above for vendor advisories and patch information. Affected products include: Dani-Garcia Vaultwarden.