Authentication Bypass Vulnerability in Passwordstate Emergency Access Page
Summary
Hide β²
Show βΌ
Click Studios has released security updates for Passwordstate to address a high-severity authentication bypass vulnerability in the Emergency Access page. The flaw could allow attackers to bypass authentication using a crafted URL. The vulnerability was patched in Passwordstate 9.9 (Build 9972), released August 28, 2025. The update also includes protections against potential clickjacking attacks on the browser extension, following a technique detailed by security researcher Marek TΓ³th. Passwordstate is used by 29,000 customers and 370,000 security and IT professionals across various sectors.
Timeline
-
29.08.2025 12:58 π° 1 articles
Authentication Bypass Vulnerability in Passwordstate Emergency Access Page
Click Studios has released security updates for Passwordstate to address a high-severity authentication bypass vulnerability in the Emergency Access page. The flaw could allow attackers to bypass authentication using a crafted URL. The vulnerability was patched in Passwordstate 9.9 (Build 9972), released August 28, 2025. The update also includes protections against potential clickjacking attacks on the browser extension, following a technique detailed by security researcher Marek TΓ³th.
Show sources
- Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page β thehackernews.com β 29.08.2025 12:58
Information Snippets
-
Passwordstate 9.9 (Build 9972) was released on August 28, 2025, to address a high-severity authentication bypass vulnerability.
First reported: 29.08.2025 12:58π° 1 source, 1 articleShow sources
- Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page β thehackernews.com β 29.08.2025 12:58
-
The vulnerability affects the Emergency Access page and can be exploited using a crafted URL.
First reported: 29.08.2025 12:58π° 1 source, 1 articleShow sources
- Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page β thehackernews.com β 29.08.2025 12:58
-
The update includes improved protections against potential clickjacking attacks on the browser extension.
First reported: 29.08.2025 12:58π° 1 source, 1 articleShow sources
- Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page β thehackernews.com β 29.08.2025 12:58
-
The clickjacking protections are in response to a technique called Document Object Model (DOM)-based extension clickjacking detailed by security researcher Marek TΓ³th.
First reported: 29.08.2025 12:58π° 1 source, 1 articleShow sources
- Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page β thehackernews.com β 29.08.2025 12:58
-
Passwordstate is used by 29,000 customers and 370,000 security and IT professionals.
First reported: 29.08.2025 12:58π° 1 source, 1 articleShow sources
- Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page β thehackernews.com β 29.08.2025 12:58
Similar Happenings
Critical SessionReaper vulnerability patched in Adobe Commerce and Magento Open Source
Adobe has patched a critical vulnerability (CVE-2025-54236) in its Commerce and Magento Open Source platforms, dubbed SessionReaper. This flaw, with a CVSS score of 9.1, could allow unauthenticated attackers to take control of customer accounts via the Commerce REST API. The patch was released on September 9, 2025, following an emergency notification to selected customers on September 4, 2025. Adobe Commerce on Cloud customers were already protected by a WAF rule deployed as an interim measure. The vulnerability is considered one of the most severe in the platform's history, with potential for widespread exploitation. Administrators are advised to apply the patch immediately, as it disables certain internal Magento functionalities that may affect custom or external code. The affected versions include Adobe Commerce 2.4.9-alpha2 and earlier, 2.4.8-p2 and earlier, 2.4.7-p7 and earlier, 2.4.6-p12 and earlier, 2.4.5-p14 and earlier, and 2.4.4-p15 and earlier. The affected versions also include Adobe Commerce B2B 1.5.3-alpha2 and earlier, 1.5.2-p2 and earlier, 1.4.2-p7 and earlier, 1.3.4-p14 and earlier, and 1.3.3-p15 and earlier. The affected versions include Magento Open Source 2.4.9-alpha2 and earlier, 2.4.8-p2 and earlier, 2.4.7-p7 and earlier, 2.4.6-p12 and earlier, and 2.4.5-p14 and earlier. The Custom Attributes Serializable module versions 0.1.0 to 0.4.0 are also affected.
Active exploitation of SAP S/4HANA command injection vulnerability CVE-2025-42957
A critical command injection vulnerability in SAP S/4HANA, tracked as CVE-2025-42957, is being actively exploited in the wild. The flaw allows attackers with low-privileged user access to execute arbitrary ABAP code, potentially leading to full system compromise. The vulnerability affects both on-premise and private cloud editions of SAP S/4HANA. The exploit can result in unauthorized modification of the SAP database, creation of superuser accounts, and theft of password hashes. Organizations are advised to apply patches immediately and monitor for suspicious activity. The vulnerability was fixed by the vendor on August 11, 2025, but several systems have not applied the available security updates, and these are now being targeted by hackers who have weaponized the bug. SecurityBridge discovered the vulnerability and reported it to SAP on June 27, 2025, and even assisted in the development of a patch. SecurityBridge and Pathlock have confirmed active exploitation of the vulnerability. The patch for CVE-2025-42957 is relatively easy to reverse engineer, and successful exploitation gives attackers access to the operating system and all data in the targeted SAP system. Organizations are urged to implement additional security measures, such as SAP's Unified Connectivity framework (UCON), to restrict RFC usage and monitor logs for suspicious activity.
Exploit chain in Sitecore Experience Platform enables remote code execution
Three new vulnerabilities in the Sitecore Experience Platform can be chained to achieve remote code execution (RCE). The flaws include HTML cache poisoning, RCE through insecure deserialization, and information disclosure via the ItemService API. Patches for these vulnerabilities were released in June and July 2025. The exploit chain leverages a combination of pre-authentication and post-authentication vulnerabilities to compromise fully-patched instances of the platform. Additionally, a zero-day vulnerability (CVE-2025-53690) has been exploited by threat actors to deliver malware, including WeepSteel, and perform extensive reconnaissance and lateral movement. The flaw is a ViewState deserialization vulnerability caused by the inclusion of a sample ASP.NET machine key in pre-2025 Sitecore guides. The attackers target the '/sitecore/blocked.aspx' endpoint, which contains an unauthenticated ViewState field, and achieve RCE under the IIS NETWORK SERVICE account by leveraging CVE-2025-53690. The malicious payload dropped by the attackers is WeepSteel, a reconnaissance backdoor that gathers system, process, disk, and network information. The attack observed by Mandiant stemmed from a documentation issue involving sample machine keys provided for customer use. Sitecore advised customers to rotate and secure ASP.NET machine keys, encrypt