Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0517

NIXPKGS-2026-0517
published on
Permalink CVE-2026-27898
5.4 MEDIUM
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): LOW
  • Integrity impact (I): LOW
  • Availability impact (A): NONE
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package vaultwarden-webvault
  • @LeSuisse accepted
  • @LeSuisse deleted
    2 maintainers
    • @dotlambda
    • @SuperSandro2000
    maintainer.delete
  • @LeSuisse published on GitHub
Vaultwarden: Unauthorized Access via Partial Update API on Another User’s Cipher

Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, an authenticated regular user can specify another user’s cipher_id and call "PUT /api/ciphers/{id}/partial" Even though the standard retrieval API correctly denies access to that cipher, the partial update endpoint returns 200 OK and exposes cipherDetails (including name, notes, data, secureNote, etc.). This issue has been patched in version 1.35.4.

Affected products

vaultwarden
  • ==< 1.35.4

Matching in nixpkgs

Ignored packages (1)

Package maintainers

Ignored maintainers (2)
Upstream advisory: https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-w9f8-m526-h7fh