<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Bitwarden Server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/bitwarden-server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 18:18:10 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/bitwarden-server/feed.xml" rel="self" type="application/rss+xml"/><item><title>Bitwarden Server SCIM API Key Authentication Bypass (CVE-2026-43640)</title><link>https://feed.craftedsignal.io/briefs/2026-05-bitwarden-scim-bypass/</link><pubDate>Mon, 11 May 2026 18:18:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bitwarden-scim-bypass/</guid><description>Bitwarden Server before v2026.4.1 allows an authenticated user with SCIM management privileges to bypass master-password re-authentication when retrieving or rotating an organization's SCIM API key, potentially leading to unauthorized access.</description><content:encoded><![CDATA[<p>Bitwarden Server prior to version v2026.4.1 is vulnerable to an authentication bypass. The vulnerability, identified as CVE-2026-43640, allows an authenticated user with SCIM (System for Cross-domain Identity Management) management privileges to retrieve or rotate an organization&rsquo;s SCIM API key without requiring master-password re-authentication. This means that if an attacker gains access to a valid user session with SCIM management privileges, they can obtain the SCIM API key without needing to know the user&rsquo;s master password. The issue stems from an incorrect implementation of the authentication algorithm (CWE-303). This can lead to unauthorized access to sensitive resources managed through the SCIM API.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Bitwarden Server account with SCIM management privileges, potentially through credential stuffing or phishing.</li>
<li>The attacker authenticates to the Bitwarden Server web interface using the compromised credentials.</li>
<li>The attacker navigates to the organization settings related to SCIM configuration.</li>
<li>Instead of being prompted for master password re-authentication, the attacker is granted access to retrieve the SCIM API Key.</li>
<li>The attacker retrieves the existing SCIM API key.</li>
<li>Alternatively, the attacker can initiate a SCIM API key rotation, generating a new key without master password verification.</li>
<li>The attacker uses the obtained SCIM API key to access and manage user accounts and groups within the organization&rsquo;s identity provider.</li>
<li>The attacker could create new admin accounts, modify existing ones, or exfiltrate sensitive user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43640 can lead to a complete compromise of the affected organization&rsquo;s identity management. An attacker with a valid user session with SCIM management privileges can obtain the SCIM API key and use it to perform unauthorized actions, such as creating new administrative accounts, modifying existing user accounts, or exfiltrating sensitive user data. This vulnerability affects all Bitwarden Server instances prior to version v2026.4.1.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Bitwarden Server to version v2026.4.1 or later to patch CVE-2026-43640.</li>
<li>Monitor Bitwarden Server logs for unusual activity related to SCIM API key retrieval or rotation, using the log source <code>webserver</code>.</li>
<li>Implement multi-factor authentication (MFA) on all Bitwarden accounts, especially those with administrative privileges.</li>
<li>Deploy the Sigma rule provided below to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>authentication-bypass</category><category>privilege-escalation</category><category>cve</category></item><item><title>Bitwarden Server Missing Authorization Vulnerability Leading to Organization Takeover (CVE-2026-43639)</title><link>https://feed.craftedsignal.io/briefs/2026-05-bitwarden-takeover/</link><pubDate>Mon, 11 May 2026 18:17:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-bitwarden-takeover/</guid><description>Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability (CVE-2026-43639) that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of the target organization in cloud-hosted deployments.</description><content:encoded><![CDATA[<p>Bitwarden Server before version 2026.4.0 is susceptible to a missing authorization vulnerability identified as CVE-2026-43639. This flaw allows a malicious provider service user in a multi-tenant cloud environment to add an arbitrary organization to their provider account. The vulnerability is located in the <code>/providers/{providerId}/clients/existing</code> endpoint. Successful exploitation leads to the takeover of the target organization, granting the attacker unauthorized access and control. Self-hosted Bitwarden installations are not affected as the vulnerable endpoint is exclusively available in the cloud-hosted version due to the <code>SelfHosted(NotSelfHostedOnly = true)</code> restriction. This issue was reported by VulnCheck.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates as a legitimate provider service user within a Bitwarden Cloud environment.</li>
<li>The attacker crafts a malicious <code>POST</code> request targeting the <code>/providers/{providerId}/clients/existing</code> endpoint.</li>
<li>The <code>providerId</code> is replaced with the attacker&rsquo;s provider ID.</li>
<li>The request body includes data identifying the target organization to be added to the attacker&rsquo;s provider account.</li>
<li>Due to the missing authorization check, the server processes the request without validating if the attacker has permission to manage the target organization.</li>
<li>The target organization is successfully added to the attacker&rsquo;s provider account.</li>
<li>The attacker gains unauthorized access and control over the target organization&rsquo;s Bitwarden data.</li>
<li>The attacker can then access sensitive credentials, modify organization settings, and potentially exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43639 allows an attacker to takeover a Bitwarden organization in a cloud-hosted environment. This can lead to significant data breaches, as the attacker gains access to all passwords and secrets stored within the compromised organization&rsquo;s vault. The impact includes potential financial loss, reputational damage, and legal liabilities for the affected organization. The number of potentially affected organizations is limited to Bitwarden&rsquo;s cloud-hosted users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Bitwarden Server to version 2026.4.0 or later to patch CVE-2026-43639.</li>
<li>Deploy the Sigma rule &ldquo;Detect Bitwarden Provider Organization Takeover Attempt&rdquo; to monitor for suspicious POST requests to the <code>/providers/{providerId}/clients/existing</code> endpoint.</li>
<li>Monitor web server logs for anomalous POST requests to <code>/providers/{providerId}/clients/existing</code> originating from provider service users.</li>
<li>Review Bitwarden Cloud provider configurations for any unauthorized organization additions.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>bitwarden</category><category>takeover</category><category>missing-authorization</category><category>cloud</category></item></channel></rss>