CVE-2026-43911 PUBLISHED

Vaultwarden: Refresh tokens not invalidated on security stamp rotation

Assigner: GitHub_M
Reserved: 04.05.2026 Published: 11.05.2026 Updated: 11.05.2026

Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.5, refresh tokens are not invalidated when the user's security_stamp is rotated by some security-sensitive operations (password change, KDF change, key rotation, email change, org admin password reset, emergency access takeover). This allows an attacker holding a previously obtained refresh token to maintain session access even after the user has taken action to secure their account. This vulnerability is fixed in 1.35.5.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
CVSS Score: 6.8

Product Status

Vendor dani-garcia
Product vaultwarden
Versions
  • Version < 1.35.5 is affected

References

Problem Types

  • CWE-613: Insufficient Session Expiration CWE