CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-24364: vaultwarden allows RCE in the admin panel

7.2 CVSS

Description

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker with authenticated access to the vaultwarden admin panel can execute arbitrary code in the system. The attacker could then change some settings to use sendmail as mail agent but adjust the settings in such a way that it would use a shell command. It then also needed to craft a special favicon image which would have the commands embedded to run during for example sending a test email. This vulnerability is fixed in 1.33.0.

Classification

CVE ID: CVE-2025-24364

CVSS Base Severity: HIGH

CVSS Base Score: 7.2

Affected Products

Vendor: dani-garcia

Product: vaultwarden

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.72% (scored less or equal to compared to others)

EPSS Date: 2025-02-25 (when was this score calculated)

References

https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4
https://github.com/dani-garcia/vaultwarden/releases/tag/1.33.0

Timeline