CVE-2024-56335
NixOS vulnerability analysis and mitigation

Overview

vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. The vulnerability (CVE-2024-56335) was discovered and disclosed on December 20, 2024. The vulnerability affects versions prior to 1.32.7 and allows attackers to update or delete groups from an organization under specific conditions. This vulnerability is only applicable for servers that have enabled the ORG_GROUPS_ENABLED setting, which is disabled by default (GitHub Advisory).

Technical details

The vulnerability requires three specific conditions to be exploited: 1) The attacker must have a user account on the server, 2) The attacker's account must have admin or owner permissions in an unrelated organization, and 3) The attacker must know the target organization's UUID and the target group's UUID. The vulnerability has been assigned a CVSS v3.1 base score of 7.6 (High) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L. The vulnerability is associated with multiple CWE categories including CWE-269 (Improper Privilege Management), CWE-284 (Improper Access Control), CWE-285 (Improper Authorization), and CWE-287 (Improper Authentication) (NVD).

Impact

The vulnerability can lead to two primary impact scenarios: 1) Denial of service, where the attacker can limit users from accessing the organization's data by removing their membership from the group, and 2) Privilege escalation, where if the attacker is part of the victim organization, they can escalate their own privileges by joining a group they wouldn't normally have access to. For attackers that aren't part of the organization, this vulnerability shouldn't lead to any possible plain-text data exfiltration as all the data is encrypted client-side (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Vaultwarden version 1.32.7, and users are recommended to update as soon as possible. For users unable to update immediately, two workarounds are available: 1) Disabling ORG_GROUPS_ENABLED, which would disable groups functionality on the server, or 2) Disabling SIGNUPS_ALLOWED, which would prevent attackers from creating new accounts on the server (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management