CVE-2024-55224
Description
An HTML injection vulnerability in Vaultwarden prior to v1.32.5 allows attackers to execute arbitrary code via injecting a crafted payload into the username field of an e-mail message.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Vaultwarden prior to v1.32.5 contains an HTML injection vulnerability in the username field of email messages, enabling arbitrary code execution.
An HTML injection vulnerability exists in Vaultwarden versions prior to v1.32.5. The flaw allows an attacker to inject a crafted payload into the username field of an email message, leading to arbitrary code execution [1]. The root cause lies in insufficient sanitization of user-controlled input when constructing email content.
To exploit this vulnerability, an attacker must have the ability to create or modify a user account with a malicious username containing HTML or JavaScript. No special network position is required beyond normal application access. The payload is then executed when the Vaultwarden server generates and sends an email containing the tainted username, for example during password resets or notification emails.
Successful exploitation could allow an attacker to execute arbitrary code in the context of the application, potentially leading to unauthorized access, data exfiltration, or further compromise of the vault server.
The vulnerability has been patched in Vaultwarden version 1.32.5. Users are strongly advised to upgrade immediately [2]. No workaround is available other than applying the update.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vaultwardencrates.io | < 1.32.5 | 1.32.5 |
Affected products
3- Vaultwarden/Vaultwardendescription
- Range: <1.32.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-g5x8-v2ch-gj2gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-55224ghsaADVISORY
- github.com/dani-garcia/vaultwarden/releases/tag/1.32.4ghsaWEB
- github.com/dani-garcia/vaultwarden/releases/tag/1.32.5ghsaWEB
- insinuator.net/2024/11/vulnerability-disclosure-authentication-bypass-in-vaultwarden-versions-1-32-5ghsaWEB
- insinuator.net/2024/11/vulnerability-disclosure-authentication-bypass-in-vaultwarden-versions-1-32-5/mitre
News mentions
0No linked articles in our index yet.