Vulnerability Description
Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid session.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bitwarden | Server | < 2026.4.1 |
Related Weaknesses (CWE)
References
- https://github.com/bitwarden/server/commit/eb251d9bf80724c87b187661783b9354d1784Patch
- https://github.com/bitwarden/server/pull/7403Issue TrackingPatch
- https://github.com/bitwarden/server/releases/tag/v2026.4.1Release Notes
- https://sanjokkarki.com.np/blog/bitwarden-scim-key-bypassExploitThird Party Advisory
- https://www.vulncheck.com/advisories/bitwarden-server-authentication-bypass-via-Third Party Advisory
FAQ
What is CVE-2026-43640?
CVE-2026-43640 is a vulnerability with a CVSS score of 8.1 (HIGH). Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management p...
How severe is CVE-2026-43640?
CVE-2026-43640 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43640?
Check the references section above for vendor advisories and patch information. Affected products include: Bitwarden Server.