Vulnerability Description
Vaultwarden is a Bitwarden-compatible server written in Rust. In version 1.35.4 and earlier, the get_org_collections_details endpoint (GET /api/organizations/{org_id}/collections/details) is missing the has_full_access() authorization check that exists on the sibling get_org_collections endpoint. This allows any Manager-role user with accessAll=False and no collection assignments to retrieve the names, UUIDs, user-to-collection mappings, and group-to-collection mappings for all collections in the organization. This issue has been fixed in version 1.35.5.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dani-Garcia | Vaultwarden | < 1.35.5 |
Related Weaknesses (CWE)
References
- https://github.com/dani-garcia/vaultwarden/releases/tag/1.35.5ProductRelease Notes
- https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-jjxg-p3v6-52MitigationVendor Advisory
FAQ
What is CVE-2026-33420?
CVE-2026-33420 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Vaultwarden is a Bitwarden-compatible server written in Rust. In version 1.35.4 and earlier, the get_org_collections_details endpoint (GET /api/organizations/{org_id}/collections/details) is missing t...
How severe is CVE-2026-33420?
CVE-2026-33420 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33420?
Check the references section above for vendor advisories and patch information. Affected products include: Dani-Garcia Vaultwarden.