Moderate severityNVD Advisory· Published Mar 4, 2026· Updated Mar 5, 2026
Vaultwarden: 2FA Bypass on Protected Actions due to Faulty Rate Limit Enforcement
CVE-2026-27801
Description
Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Vaultwarden versions 1.34.3 and prior are susceptible to a 2FA bypass when performing protected actions. An attacker who gains authenticated access to a user’s account can exploit this bypass to perform protected actions such as accessing the user’s API key or deleting the user’s vault and organisations the user is an admin/owner of . This issue has been patched in version 1.35.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
vaultwardencrates.io | < 1.35.0 | 1.35.0 |
Affected products
1- Range: < 1.35.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-v6pg-v89r-w8wrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-27801ghsaADVISORY
- github.com/dani-garcia/vaultwarden/security/advisories/GHSA-v6pg-v89r-w8wrghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.