CVE-2026-27803 - Vulnerability Analysis
HighCVSS: 8.3Last Updated: March 5, 2026
Vaultwarden - Broken Access Control
Overview
Vaultwarden prior to 1.35.4 contains a broken access control vulnerability caused by improper enforcement of manager permissions on collections, letting managers perform unauthorized management operations, exploit requires manager role with access to the collection.
Severity & Score
Impact
Managers can perform unauthorized management operations on collections, potentially leading to privilege escalation or data manipulation.
Mitigation
Update to version 1.35.4 or later.
Social Media Activity(2 posts)
š CVE-2026-27803 - High (8.3) Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long... š https://www.thehackerwire.com/vulnerability/CVE-2026-27803/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-27803 - High (8.3) Vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Prior to version 1.35.4, when a Manager has manage=false for a given collection, they can still perform several management operations as long... š https://www.thehackerwire.com/vulnerability/CVE-2026-27803/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-27803
- Severity
- High
- CVSS Score
- 8.3
- Type
- broken_access_control
- Status
- unconfirmed
- EPSS
- 3.8%
- Social Posts
- 2
CWE
- CWE-269
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L