Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page

Posted on August 29, 2025August 29, 2025 By CWS

Aug 29, 2025Ravie LakshmananVulnerability / Enterprise Safety
Click on Studios, the developer of enterprise-focused password administration answer Passwordstate, stated it has launched safety updates to handle an authentication bypass vulnerability in its software program.
The difficulty, which is but to be assigned a CVE identifier, has been addressed in Passwordstate 9.9 (Construct 9972), launched August 28, 2025.
The Australian firm stated it mounted a “potential Authentication Bypass when utilizing a rigorously crafted URL in opposition to the core Passwordstate Merchandise’ Emergency Entry web page.”
Additionally included within the newest model are improved protections to safeguard in opposition to potential clickjacking assaults aimed toward its browser extension, ought to customers find yourself visiting compromised websites.
The safeguards are possible in response to findings from safety researcher Marek Tóth, who, earlier this month, detailed a method referred to as Doc Object Mannequin (DOM)-based extension clickjacking that a number of password supervisor browser add-ons have been discovered susceptible to.

“A single click on anyplace on an attacker-controlled web site might enable attackers to steal customers’ information (bank card particulars, private information, login credentials, together with TOTP),” Tóth stated. “The brand new method is normal and might be utilized to different varieties of extensions.”
Based on Click on Studios, the credential supervisor is utilized by 29,000 clients and 370,000 safety and IT professionals, spanning international enterprises, authorities businesses, monetary establishments, and Fortune 500 firms.
The disclosure comes over 4 years after the corporate suffered a provide chain breach that enabled attackers to hijack the software program’s replace mechanism with the intention to drop malware able to harvesting delicate info from compromised programs.
Then in December 2022, Click on Studios additionally resolved a number of safety flaws in Passwordstate, together with an authentication bypass for Passwordstate’s API (CVE-2022-3875, CVSS rating: 9.1) that might have been exploited by an unauthenticated distant adversary to acquire a consumer’s plaintext passwords.

The Hacker News Tags:Access, Authentication, Bypass, Click, Emergency, Page, Passwordstate, Patches, Studios, Vulnerability

Post navigation

Previous Post: FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available
Next Post: Can Your Security Stack See ChatGPT? Why Network Visibility Matters

Related Posts

Chrome Zero-Day Exploited to Deliver Italian Memento Labs’ LeetAgent Spyware The Hacker News
Chaos RAT Malware Targets Windows and Linux via Fake Network Tool Downloads The Hacker News
Google Launches New Maps Feature to Help Businesses Report Review-Based Extortion Attempts The Hacker News
Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities The Hacker News
Enterprise Credentials at Risk – Same Old, Same Old? The Hacker News
LinkPro Linux Rootkit Uses eBPF to Hide and Activates via Magic TCP Packets The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerable Codes in Legacy Python Packages Enables Attacks on Python Package Index Via Domain Compromise
  • Over 390 Abandoned iCalendar Sync Domains Could Expose ~4 Million Devices to Security Risks
  • Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Quttera Launches “Evidence-as-Code” API to Automate Security Compliance for SOC 2 and PCI DSS v4.0

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark