CVE-2024-33669

An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:passbolt:passbolt_browser_extension:*:*:*:*:*:*:*:*

History

18 Jun 2025, 19:26

Type Values Removed Values Added
First Time Passbolt
Passbolt passbolt Browser Extension
CPE cpe:2.3:a:passbolt:passbolt_browser_extension:*:*:*:*:*:*:*:*
References () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - Third Party Advisory, Exploit
References () https://haveibeenpwned.com - () https://haveibeenpwned.com - Product
References () https://help.passbolt.com/incidents/pwned-password-service-information-leak - () https://help.passbolt.com/incidents/pwned-password-service-information-leak - Issue Tracking, Vendor Advisory
References () https://www.passbolt.com - () https://www.passbolt.com - Product
References () https://www.passbolt.com/security/more - () https://www.passbolt.com/security/more - Product

Information

Published : 2024-04-26 01:15

Updated : 2025-06-18 19:26


NVD link : CVE-2024-33669

Mitre link : CVE-2024-33669

CVE.ORG link : CVE-2024-33669


JSON object : View

Products Affected

passbolt

  • passbolt_browser_extension
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor