Arbitrary Code Execution Vulnerability in Vaultwarden by Bitwarden
CVE-2025-24364
What is CVE-2025-24364?
CVE-2025-24364 is a vulnerability identified in Vaultwarden, an unofficial server implementation of the popular password management tool Bitwarden, developed in Rust. The vulnerability enables authenticated users with access to the admin panel to execute arbitrary code within the system. This creates a significant security risk as an attacker could manipulate system settings and potentially gain control over sensitive data and functionalities.
Technical Details
The vulnerability arises when an authenticated user alters configurations to use sendmail as the mail agent while embedding shell commands within a specially crafted favicon image. This mechanism would execute the code during operations such as sending a test email, effectively leveraging trusted privileges to perform malicious actions. Vaultwarden has addressed this security issue in the release of version 1.33.0.
Potential Impact of CVE-2025-24364
-
Arbitrary Code Execution: The foremost impact is the ability for an attacker to execute arbitrary commands on the server, which could lead to unauthorized access to sensitive data or system resources.
-
Unauthorized Configuration Changes: The vulnerability allows attackers to change crucial settings, which can disrupt service availability or alter functionalities in ways that could be exploited further.
-
Data Exfiltration Risk: If exploited, this vulnerability creates pathways for data breaches, as attackers may extract sensitive information, including users' passwords and confidential data stored in Vaultwarden.
Affected Version(s)
vaultwarden < 1.33.0
