Activity log
- Created suggestion
Vaultwarden WebAuthn credential metadata tampered before signature verification
Vaultwarden is a Bitwarden-compatible server written in Rust. In versions 1.35.4 and earlier, the WebAuthn authentication flow in `validate_webauthn_login()` updates persistent credential metadata (1backup_eligible1 and 1backup_state flags1) based on unverified `authenticatorData` before signature validation is performed. An attacker who knows a user's password but cannot produce a valid WebAuthn signature can permanently modify the stored backup flags for that user's credential. If signature verification fails, the database update is not rolled back. This can result in a persistent denial of service of WebAuthn two-factor authentication for affected credentials. This issue has been fixed in version 1.35.5.
References
-
https://github.com/dani-garcia/vaultwarden/releases/tag/1.35.5 x_refsource_MISC
Affected products
- ==< 1.35.5
Matching in nixpkgs
pkgs.vaultwarden
Unofficial Bitwarden compatible server written in Rust
pkgs.vaultwarden-mysql
Unofficial Bitwarden compatible server written in Rust
pkgs.vaultwarden-sqlite
Unofficial Bitwarden compatible server written in Rust
pkgs.vaultwarden-webvault
Integrates the web vault into vaultwarden
-
nixos-unstable 2026.3.1+0
- nixpkgs-unstable 2026.4.1+0
- nixos-unstable-small 2026.4.1+0
Package maintainers
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>
-
@SuperSandro2000 Sandro Jäckel <sandro.jaeckel@gmail.com>