Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page

Posted on August 29, 2025August 29, 2025 By CWS

Aug 29, 2025Ravie LakshmananVulnerability / Enterprise Safety
Click on Studios, the developer of enterprise-focused password administration answer Passwordstate, stated it has launched safety updates to handle an authentication bypass vulnerability in its software program.
The difficulty, which is but to be assigned a CVE identifier, has been addressed in Passwordstate 9.9 (Construct 9972), launched August 28, 2025.
The Australian firm stated it mounted a “potential Authentication Bypass when utilizing a rigorously crafted URL in opposition to the core Passwordstate Merchandise’ Emergency Entry web page.”
Additionally included within the newest model are improved protections to safeguard in opposition to potential clickjacking assaults aimed toward its browser extension, ought to customers find yourself visiting compromised websites.
The safeguards are possible in response to findings from safety researcher Marek Tóth, who, earlier this month, detailed a method referred to as Doc Object Mannequin (DOM)-based extension clickjacking that a number of password supervisor browser add-ons have been discovered susceptible to.

“A single click on anyplace on an attacker-controlled web site might enable attackers to steal customers’ information (bank card particulars, private information, login credentials, together with TOTP),” Tóth stated. “The brand new method is normal and might be utilized to different varieties of extensions.”
Based on Click on Studios, the credential supervisor is utilized by 29,000 clients and 370,000 safety and IT professionals, spanning international enterprises, authorities businesses, monetary establishments, and Fortune 500 firms.
The disclosure comes over 4 years after the corporate suffered a provide chain breach that enabled attackers to hijack the software program’s replace mechanism with the intention to drop malware able to harvesting delicate info from compromised programs.
Then in December 2022, Click on Studios additionally resolved a number of safety flaws in Passwordstate, together with an authentication bypass for Passwordstate’s API (CVE-2022-3875, CVSS rating: 9.1) that might have been exploited by an unauthenticated distant adversary to acquire a consumer’s plaintext passwords.

The Hacker News Tags:Access, Authentication, Bypass, Click, Emergency, Page, Passwordstate, Patches, Studios, Vulnerability

Post navigation

Previous Post: FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available
Next Post: Can Your Security Stack See ChatGPT? Why Network Visibility Matters

Related Posts

U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network The Hacker News
Uncover LOTS Attacks Hiding in Trusted Tools — Learn How in This Free Expert Session The Hacker News
Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code The Hacker News
Chrome 0-Day, 7.3 Tbps DDoS, MFA Bypass Tricks, Banking Trojan and More The Hacker News
Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers The Hacker News
How to Deploy AI More Securely at Scale The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • NodeBB Vulnerability Let Attackers Inject Boolean-Based Blind and PostgreSQL Error-Based Payloads
  • In Other News: Iranian Ships Hacked, Verified Android Developers, AI Used in Attacks
  • VerifTools Fake ID Operation Dismantled by Law Enforcement
  • Hackers Weaponize PDF Along With a Malicious LNK File to Compromise Windows Systems
  • Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News