CVE-2026-43913 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: May 11, 2026
Vaultwarden - Broken Access Control
Published: May 11, 2026Updated: May 11, 2026Remote Exploitable
Overview
Vaultwarden prior to 1.35.5 contains a broken access control vulnerability caused by insufficient verification of organization owner confirmation status in the POST /api/ciphers/purge endpoint, letting authenticated unconfirmed organization owners purge all organization vault data, exploit requires authenticated invited organization owner.
Severity & Score
Severity: High
CVSS Score: 8.1
Impact
Authenticated unconfirmed organization owners can delete all organization vault data, causing complete data loss for the organization.
Mitigation
Update to version 1.35.5 or later.
Related Resources
Details
- CVE ID
- CVE-2026-43913
- Severity
- High
- CVSS Score
- 8.1
- Type
- broken_access_control
- Status
- new
CWE
- CWE-863
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H