Article Details
Scrape Timestamp (UTC): 2025-08-20 14:52:58.678
Original Article Text
Click to Toggle View
Major password managers can leak logins in clickjacking attacks. Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details. Threat actors could exploit the security issues when victims visit a malicious page or websites vulnerable to cross-site scripting (XSS) or cache poisoning, where attackers overlay invisible HTML elements over the password manager interface. While users believe they are interacting with harmless clickable elements, they trigger autofill actions that leak sensitive information. The flaws were presented during the recent DEF CON 33 hacker conference by independent researcher Marek Tóth. Researchers at cybersecurity company Socket later verified the findings and helped inform impacted vendors and coordinate public disclosure. The researcher tested his attack on certain versions of 1Password, Bitwarden, Enpass, iCloud Passwords, LastPass, and LogMeOnce, and found that all their browser-based variants could leak sensitive info under certain scenarios. Exploitation methods The main attack mechanic is to run a script on a malicious or compromised website that uses opacity settings, overlays, or pointer-event tricks to hide the autofill dropdown menu of a browser-based password manager. The attacker then overlays fake intrusive elements (e.g. cookie banners, popups, or CAPTCHA) so that the user’s clicks fall on the hidden password manager controls, resulting in completing the forms with sensitive information. Tóth demonstrated multiple DOM-based subtypes that constitute exploitation variants of the same flaw, including direct DOM element opacity manipulation, root element opacity manipulation, parent element opacity manipulation, and partial or full overlaying. The researcher also demonstrated the possibility of using a method where the UI follows the mouse cursor, so any user click, no matter where it’s positioned, triggers data autofill. Tóth says that a universal attack script can be used to identify the password manager active on the target’s browser and then adapt the attack in real-time. Vendor impact and responses The researcher tested 11 password managers chosen for their popularity and found that all of them were vulnerable to at least one attack method. With the help of Socket, all vendors were notified of the issues in April 2025. The researcher also alerted them that public disclosure would follow in August at DEF CON 33. 1Password rejected the report, categorizing it as “out-of-scope/informative,” arguing that clickjacking is a general web risk users should mitigate. Similarly, LastPass marked the report as “informative,” while Bitwarden acknowledged the issues but downplayed the severity. However, Bitwarden told BleepingComputer that the issues have been fixed in version 2025.8.0, rolling out this week. It is unclear if LastPass and 1Password are planning to address the problem. LogMeOnce did not respond to any communication attempts, either by Tóth or Socket. Currently, the following password managers, which together have around 40 million users, are vulnerable to Tóth's attack methods The vendors that implemented fixes are Dashlane (v6.2531.1 released on August 1), NordPass, ProtonPass, RoboForm, and Keeper (v17.2.0 released in July). However, users should make sure that they're running the latest available versions of the products. Until fixes become available, Tóth recommends that users disable the autofill function in their password managers and only use copy/paste. BleepingComputer has contacted all vendors who haven’t pushed fixes onto their products yet, and we will update this post with their responses once they reach us. Picus Blue Report 2025 is Here: 2X increase in password cracking 46% of environments had passwords cracked, nearly doubling from 25% last year. Get the Picus Blue Report 2025 now for a comprehensive look at more findings on prevention, detection, and data exfiltration trends.
Daily Brief Summary
Six major password managers, including 1Password and LastPass, are vulnerable to clickjacking flaws, risking exposure of user credentials, 2FA codes, and credit card details.
The vulnerabilities allow attackers to overlay invisible HTML elements over password manager interfaces, tricking users into triggering autofill actions on malicious sites.
Independent researcher Marek Tóth presented these findings at DEF CON 33, with cybersecurity company Socket verifying and coordinating disclosure with affected vendors.
Attack methods include manipulating DOM elements and using scripts that adapt in real-time to identify and exploit the active password manager.
While some vendors like Bitwarden have released fixes, others like 1Password have dismissed the issue as a general web risk, leaving users potentially exposed.
Users are advised to disable autofill functions and use copy/paste until updates are applied to mitigate the risk of data leakage.
The incident reflects the ongoing challenges in securing browser-based password managers against sophisticated web-based attacks.