CVE-2019-1000001
Description
TeamPass version 2.1.27 and earlier contains a Storing Passwords in a Recoverable Format vulnerability in Shared password vaults that can result in all shared passwords are recoverable server side. This attack appears to be exploitable via any vulnerability that can bypass authentication or role assignment and can lead to shared password leakage.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
TeamPass 2.1.27 and earlier stores shared passwords in a recoverable format, allowing authenticated attackers with bypassed access controls to decrypt all shared passwords.
Vulnerability
TeamPass version 2.1.27 and earlier contains a design flaw in how shared password vaults are encrypted. The encryption key for shared passwords is split between a file on the server and the database, and the user's own password is not used to protect shared vault keys [1][3]. This means the server-side material alone is sufficient to decrypt all shared passwords, requiring no per-user secret. The affected versions are all TeamPass releases up to and including 2.1.27 [1].
Exploitation
An attacker needs to bypass authentication or role assignment controls to gain access to the TeamPass interface [1]. Once access is obtained, no further decryption step requiring the victim's password is needed; the attacker can directly access any shared password stored in the vaults they can reach. The attack does not require physical access or privileged network position if the web interface is exposed [1][3].
Impact
Successful exploitation results in leakage of all shared passwords managed by TeamPass. The confidentiality of credentials stored in shared vaults is completely compromised. The attacker gains the ability to read credentials that may belong to different roles or users, as the encryption does not differentiate between roles [3]. This can lead to further compromise of downstream systems protected by those credentials.
Mitigation
Not yet disclosed in the available references. Users of TeamPass 2.1.27 and earlier should upgrade to a version newer than 2.1.27 if available. The project's GitHub repository (nilsteampassnet/TeamPass) should be monitored for security releases [2]. At the time of this writing, no fixed version has been identified in the provided references, and no workaround is documented.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
nilsteampassnet/teampassPackagist | <= 2.1.27 | — |
Affected products
2- Range: 2.1.20, 2.1.25.0, 2.1.25.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-q9qr-h33g-fw3jghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-1000001ghsaADVISORY
- github.com/nilsteampassnet/TeamPass/issues/2495ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.