CVE-2025-24364

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24364
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24364.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-24364
Aliases
  • GHSA-h6cc-rc6q-23j4
Published
2025-01-27T18:15:41Z
Modified
2025-05-28T10:44:28.807217Z
Summary
[none]
Details

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker with authenticated access to the vaultwarden admin panel can execute arbitrary code in the system. The attacker could then change some settings to use sendmail as mail agent but adjust the settings in such a way that it would use a shell command. It then also needed to craft a special favicon image which would have the commands embedded to run during for example sending a test email. This vulnerability is fixed in 1.33.0.

References

Affected packages

Git / github.com/dani-garcia/vaultwarden

Affected ranges

Type
GIT
Repo
https://github.com/dani-garcia/vaultwarden
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.11.0
0.12.0
0.13.0

1.*

1.0.0
1.1.0
1.10.0
1.11.0
1.12.0
1.13.0
1.13.1
1.14
1.14.1
1.14.2
1.15.0
1.15.1
1.16.0
1.16.1
1.16.2
1.16.3
1.17.0
1.18.0
1.19.0
1.2.0
1.20.0
1.21.0
1.22.0
1.22.1
1.22.2
1.23.0
1.23.1
1.24.0
1.25.0
1.25.1
1.25.2
1.26.0
1.27.0
1.28.0
1.28.1
1.29.0
1.29.1
1.29.2
1.3.0
1.30.0
1.30.1
1.30.2
1.30.3
1.30.4
1.30.5
1.31.0
1.32.0
1.32.1
1.32.2
1.32.3
1.32.4
1.32.5
1.32.6
1.32.7
1.4.0
1.5.0
1.6.0
1.6.1
1.7.0
1.8.0
1.9.0
1.9.1