Vulnerability Description
Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.5, Vaultwarden allows an unconfirmed organization owner to purge the entire organization vault. The organization invite flow uses a two-step process: accepting an invite transitions membership from Invited to Accepted, and a separate confirmation by an existing owner upgrades it to Confirmed. The POST /api/ciphers/purge endpoint uses plain Headers and only checks that the membership type is Owner without verifying that the membership status is Confirmed. An authenticated user who has been invited as an organization owner and has accepted the invite and has not yet been confirmed can call this endpoint to hard-delete all ciphers and attachments in the organization, causing immediate organization-wide data loss. This vulnerability is fixed in 1.35.5.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Dani-Garcia | Vaultwarden | < 1.35.5 |
Related Weaknesses (CWE)
References
- https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-937x-3j8m-7wExploitMitigationVendor Advisory
FAQ
What is CVE-2026-43913?
CVE-2026-43913 is a vulnerability with a CVSS score of 8.1 (HIGH). Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.5, Vaultwarden allows an unconfirmed organization owner to purge the entire organization vault. The organization invite flow...
How severe is CVE-2026-43913?
CVE-2026-43913 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-43913?
Check the references section above for vendor advisories and patch information. Affected products include: Dani-Garcia Vaultwarden.