CVE-2024-55224
Rust vulnerability analysis and mitigation

Overview

An HTML injection vulnerability was discovered in Vaultwarden versions prior to v1.32.5, identified as CVE-2024-55224. The vulnerability allows attackers to execute arbitrary code by injecting a crafted payload into the username field of an e-mail message. The issue was discovered during a security audit and was fixed in version 1.32.5 released in November 2024 (Vaultwarden Release).

Technical details

The vulnerability exists in the email template system where usernames are included in emergency access invites. When a manipulated username is included in the mail template, it is not properly escaped, allowing attackers to add a body separator and inject custom HTML content. The vulnerability has been assigned a CVSS 3.1 base score of 9.6 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H) (NVD Database).

Impact

The vulnerability allows attackers to inject arbitrary HTML code into email messages, which could be used to execute malicious scripts when the email is viewed by recipients. This could potentially lead to unauthorized access to user data or further system compromise (Insinuator Report).

Mitigation and workarounds

Users are strongly recommended to upgrade to Vaultwarden version 1.32.5 or later, which contains the fix for this vulnerability. The update properly implements input sanitization for usernames in email templates (Vaultwarden Release).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management