CVE-2024-55226
Description
Vaultwarden v1.32.5 was discovered to contain an authenticated reflected cross-site scripting (XSS) vulnerability via the component /api/core/mod.rs.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Vaultwarden v1.32.5 has an authenticated reflected XSS vulnerability in /api/core/mod.rs, allowing script injection in authenticated contexts.
Overview
CVE-2024-55226 describes an authenticated reflected cross-site scripting (XSS) vulnerability in Vaultwarden version 1.32.5. The flaw resides in the /api/core/mod.rs component, where user input is improperly sanitized, enabling an attacker who has already authenticated to inject arbitrary JavaScript into a page that is subsequently reflected back to the victim's browser.
Exploitation
Details To exploit this vulnerability, an attacker must first possess valid credentials for the Vaultwarden instance. The attack vector relies on crafting a malicious link or request that includes a payload in a parameter processed by the affected endpoint. When the authenticated victim visits that crafted URL, the payload is reflected and executed in their session context. No further privileges beyond standard user authentication are required, but the attacker must be able to trick an authenticated user into accessing the malicious link.
Impact
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's authenticated session. This can lead to session hijacking, exfiltration of stored vault credentials, or unauthorized actions performed on behalf of the victim. Given that Vaultwarden is a password management server, the impact of such an attack is severe, potentially exposing all stored secrets of a compromised user.
Mitigation
The vulnerability is fixed in Vaultwarden version 1.32.4 and later releases [2]. Users are strongly advised to upgrade to the latest version. No workarounds have been publicly documented; updating the server software is the recommended course of action. The issue was discovered during a penetration test and disclosed responsibly [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vaultwardencrates.io | < 1.32.5 | 1.32.5 |
Affected products
3- Vaultwarden/Vaultwardendescription
- Range: = 1.32.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-vprm-27pv-jp3wghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-55226ghsaADVISORY
- github.com/dani-garcia/vaultwarden/releases/tag/1.32.4ghsaWEB
- github.com/dani-garcia/vaultwarden/releases/tag/1.32.5ghsaWEB
- insinuator.net/2024/11/vulnerability-disclosure-authentication-bypass-in-vaultwarden-versions-1-32-5ghsaWEB
- insinuator.net/2024/11/vulnerability-disclosure-authentication-bypass-in-vaultwarden-versions-1-32-5/mitre
News mentions
0No linked articles in our index yet.