Bug 2476357 (CVE-2026-43914) - CVE-2026-43914 vaultwarden: Vaultwarden: Brute-force protection bypass via unprotected 2FA function allows unauthorized access
Summary: CVE-2026-43914 vaultwarden: Vaultwarden: Brute-force protection bypass via un...
Keywords:
Status: NEW
Alias: CVE-2026-43914
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2476415 2476416
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-05-11 23:04 UTC by OSIDB Bzimport
Modified: 2026-05-12 09:45 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-05-11 23:04:14 UTC
Vaultwarden is a Bitwarden-compatible server written in Rust. Prior to 1.35.4, there is a security vulnerability in Vaultwarden that allows bypassing the login brute-force protection if email 2fa is enabled. If email 2fa is enabled, the unprotected 2fa-function send_email_login (email.rs, api endpoint /api/two-factor/send-email-login) also acts as an oracle determining whether a username-password combination is correct. An attacker can abuse that endpoint to brute-force passwords without rate-limiting. This works even for users who don't have email 2fa configured. This vulnerability is fixed in 1.35.4.


Note You need to log in before you can comment on or make changes to this bug.