VYPR
Critical severityOSV Advisory· Published Feb 4, 2019· Updated Aug 5, 2024

CVE-2019-1000001

CVE-2019-1000001

Description

TeamPass version 2.1.27 and earlier contains a Storing Passwords in a Recoverable Format vulnerability in Shared password vaults that can result in all shared passwords are recoverable server side. This attack appears to be exploitable via any vulnerability that can bypass authentication or role assignment and can lead to shared password leakage.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

TeamPass 2.1.27 and earlier stores shared passwords in a recoverable format, allowing authenticated attackers with bypassed access controls to decrypt all shared passwords.

Vulnerability

TeamPass version 2.1.27 and earlier contains a design flaw in how shared password vaults are encrypted. The encryption key for shared passwords is split between a file on the server and the database, and the user's own password is not used to protect shared vault keys [1][3]. This means the server-side material alone is sufficient to decrypt all shared passwords, requiring no per-user secret. The affected versions are all TeamPass releases up to and including 2.1.27 [1].

Exploitation

An attacker needs to bypass authentication or role assignment controls to gain access to the TeamPass interface [1]. Once access is obtained, no further decryption step requiring the victim's password is needed; the attacker can directly access any shared password stored in the vaults they can reach. The attack does not require physical access or privileged network position if the web interface is exposed [1][3].

Impact

Successful exploitation results in leakage of all shared passwords managed by TeamPass. The confidentiality of credentials stored in shared vaults is completely compromised. The attacker gains the ability to read credentials that may belong to different roles or users, as the encryption does not differentiate between roles [3]. This can lead to further compromise of downstream systems protected by those credentials.

Mitigation

Not yet disclosed in the available references. Users of TeamPass 2.1.27 and earlier should upgrade to a version newer than 2.1.27 if available. The project's GitHub repository (nilsteampassnet/TeamPass) should be monitored for security releases [2]. At the time of this writing, no fixed version has been identified in the provided references, and no workaround is documented.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
nilsteampassnet/teampassPackagist
<= 2.1.27

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.