2025.11.1 Release Notes

2025.11.1

(The listed release number is for the Bitwarden Server, other version numbers released in this cycle also include Web 2025.11.2, iOS 2025.11.0, and Android 2025.11.1)

Password Manager

  • Log in with passkeys: Now generally available in the browser extension and web app, log in to your Bitwarden account faster and more securely using passkeys.

  • Android autofill update: Password manager on Android now uses altered autofill match logic for Opera, Edge, and Samsung Internet by default. Prior to this version this was the Compatibility Mode option.

Admin Console

Self-host

  • Bitwarden Lite general availability: Bitwarden Lite, formerly Bitwarden Unified, is now generally available.

  • Environment variable update: The self-host environment variable globalSettings__syslog__destination has been deprecated. Learn more about Self-hosted environment variables.

Security

 


Additions from the GitHub releases:

 

Server 2025.11.1

  • Removed feature flags
  • Various under-the-hood improvements and minor bug fixes

 

Web Vault 2025.11.3

  • Access intelligence is now generally available
  • Removed beta label from login with passkey feature
  • Various under-the-hood improvements and minor bug fixes

 

Web Vault 2025.11.4

  • Addressed a loading issue in Access Intelligence that affected a subset of Enterprise customers.

 

Web Vault 2025.11.5

  • Fixed an issue where Access Intelligence displayed for organizations without the feature enabled.

 

Android Password Manager 2025.11.1 (20994) – Overview

  • Improved Autofill functionality in Samsung Internet, Opera, and Edge browsers.
  • General under-the-hood improvements and bug fixes.

 

Android Authenticator 2025.11.1 (1083) – Overview

  • General under-the-hood improvements and bug fixes.

 

iOS Password Manager 2025.11.0 (2763) – Overview

  • Improved performance when searching your vault in the main app and Autofill.
  • Enhanced Autofill performance when using both FIDO2 and passwords.
  • Improvement to the account creation flow.
  • General under-the-hood improvements and bug fixes.

 

iOS Authenticator 2025.11.0 (352) – Overview

  • General under-the-hood improvements and bug fixes.

 

To keep everything in one place, new versions within this Release cycle will be added to this first post.

4 Likes

Is it possible to limit this to unlocking or at least require one previous login with master password and 2FA? Otherwise, in case someone obtains my hardware key, all that stands between the attacker and my vault is a (short) PIN.

  1. I can’t answer that (no insight into BW’s developmental processes).
  2. Sounds like a feature request. :wink:

Well, given your PIN is random – and not absolutely too short – the risk might be smaller than you think. Also, because e.g. with YubiKeys, after 8 failed attempts, the FIDO2 function of the key gets blocked entirely. (I can’t say, if every hardware security does it exactly the same as Yubico)

If you still don’t feel your PIN would be strong enough – then make it stronger:

1 Like

Personally, I would oppose this (unless optional), as it would stand in the way of using Private/Incognito mode browsing, and complicate the commissioning of new devices.

The PIN can have up to 63 characters (including non-numeric characters), and should be set to have an entropy commensurate with your threat model.

Remember also to take into account that you are much more likely to quickly become aware of the physical loss of a hardware key (compared to a remote theft of digital secrets), so you will have a fighting chance to disable passkey login on your account before the PIN is cracked.

2 Likes

I know, my hope was that someone (not especially you) would know about an existing feature request or GitHub issue.

To be totally honest: My PIN is 4 digits. That’s because I use my hardware key only as a second factor, so a very short PIN is fine in that case (at least for me). That changes of course once I use it to unlock my vault without the master password.

Hm, never thought about that. Is that really a common use-case?

Is that true for all FIDO keys, like part of the spec?

Okay, good point.

This is in the proposed CTAP standard, which says that the UTF-8 representation of the PIN “MUST NOT exceed 63 bytes” (e.g., 63 ASCII-characters).

However, the proposed standard allows for an optional maxPINLength parameter, which may further restrict the maximum PIN length to be 8 Unicode code points (represented by 8–32 octets), at a minimum. If the maxPINLength parameter has not been set, then the default value of maxPINLength is 63 code points.

So I think that (once the standard is adopted), we can be guaranteed the ability to use PINs consisting of at least 32 ASCII characters.

2 Likes

Thanks, that worked for my SoloKey.

2 Likes

A post was split to a new topic: Passkey questions, related to those stored in Bitwarden, maybe those used to log into Bitwarden

To make “disable passkey login” a bit more clear – it wouldn’t be necessary to disable all login-passkeys then, but only the one that was lost / stolen / became inaccessible - as login-passkeys luckily can be removed individually in the web vault (Settings → Security → Master password → Log in with passkey).

1 Like

As far as I know, there is no specific feature request about that aspect of “login with passkeys”.

@marlin What is your use-case? Why do you use passkey login at all? A better solution for you might be to wait for the implementation of passkey unlock, and to disable passkey login altogether.

A post was merged into an existing topic: Frequent notices to ‘Update existing login’ / ‘Save (new) login’ with latest browser extensions

Hmmm… the “passkey unlock” PRs on GitHub have the titles “PRF unlock”. Probably we have to wait if there will be new and separate “unlock passkeys” we can set up – but for now, my assumption was, that we probably will be able to use the existing “login-passkeys” (and then only those with encryption – when it’s “PRF unlock”) for passkey unlock… and then, it wouldn’t be possible to delete the login-passkeys…

1 Like

I would like a convenient but secure option to unlock the browser extension.

Right now I use the desktop application with a fingerprint sensor that I bought just for this use-case. Unfortunately I am not allowed to install the Bitwarden desktop app on my work laptop, so I am limited to “unlock with PIN” there.

This is what I used to do with my yubikey5:

As I don’t use the yubico otp feature I programmed slot 1 to emit a static password (randomly generated with ykman otp static -g 1 -l 38 -k MODHEX) that has 190 bits of entropy.

I use that static password as the unlock PIN. And with its strength It’s relatively safe to uncheck the require master password on device restart option.

The main risk with a static password emited by a security key is that it’s very easy to leak it by accidentaly typing it where you shouldn’t. In that case I simply generate another one and change the unlock PIN to the new one.

Nowadays, that login with passkey is a thing in the browser extension, I don’t need to uncheck the require master password on device restart option and I just set a weak pin that I type manually to unlock.

3 Likes

Riffing off this idea, what if @marlin gets two keys (e.g., a new Series 5 Yubikey in addition to their current SoloKey)? Then they could use the Yubikey static password to emit a high-entropy PIN for user verification on the SoloKey. As long as both keys don’t get stolen at the same time, then the SoloKey could be safely be used for passkey login into Bitwarden.

That is an interesting option (thanks to @kpiris for suggesting it), but I am not a big fan of Yubikeys (or the company behind that hardware).

1 Like

Besides the fact that the security key PIN can be quite strong.

It seems that solokeys also lock the FIDO credentials after 8 attempts with the wrong PIN.

In that case, a PIN consisting of 3 words (39 bits of entropy), IMO, would be way more than enough to be safe.

2 Likes

See the thread linked below for a quantitative approach to choosing a security key PIN length/complexity: