Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bitwarden
Bitwarden server |
|
| Vendors & Products |
Bitwarden
Bitwarden server |
Mon, 11 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid session. | |
| Title | Bitwarden Server < 2026.4.1 Authentication Bypass via SCIM API Key | |
| Weaknesses | CWE-303 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-13T14:41:09.065Z
Reserved: 2026-05-01T18:22:45.642Z
Link: CVE-2026-43640
Updated: 2026-05-13T12:39:00.355Z
Status : Awaiting Analysis
Published: 2026-05-11T18:16:37.110
Modified: 2026-05-13T15:29:03.597
Link: CVE-2026-43640
No data.
OpenCVE Enrichment
Updated: 2026-05-11T19:45:08Z