CVE-2025-24365

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24365
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24365.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-24365
Aliases
  • GHSA-j4h8-vch3-f797
Published
2025-01-27T18:15:41Z
Modified
2025-05-28T10:44:28.880219Z
Summary
[none]
Details

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker can obtain owner rights of other organization. Hacker should know the ID of victim organization (in real case the user can be a part of the organization as an unprivileged user) and be the owner/admin of other organization (by default you can create your own organization) in order to attack. This vulnerability is fixed in 1.33.0.

References

Affected packages

Git / github.com/dani-garcia/vaultwarden

Affected ranges

Type
GIT
Repo
https://github.com/dani-garcia/vaultwarden
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.10.0
0.11.0
0.12.0
0.13.0

1.*

1.0.0
1.1.0
1.10.0
1.11.0
1.12.0
1.13.0
1.13.1
1.14
1.14.1
1.14.2
1.15.0
1.15.1
1.16.0
1.16.1
1.16.2
1.16.3
1.17.0
1.18.0
1.19.0
1.2.0
1.20.0
1.21.0
1.22.0
1.22.1
1.22.2
1.23.0
1.23.1
1.24.0
1.25.0
1.25.1
1.25.2
1.26.0
1.27.0
1.28.0
1.28.1
1.29.0
1.29.1
1.29.2
1.3.0
1.30.0
1.30.1
1.30.2
1.30.3
1.30.4
1.30.5
1.31.0
1.32.0
1.32.1
1.32.2
1.32.3
1.32.4
1.32.5
1.32.6
1.32.7
1.4.0
1.5.0
1.6.0
1.6.1
1.7.0
1.8.0
1.9.0
1.9.1