Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in ...
Hacker Demonstrates How Easy It Is To Steal Data From Popular Password Managers
Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers
At DEF CON 33, Czech Republic based security researcher Marek Tóth, unveiled a series of unpatched zero-day clickjacking security vulnerabilities...
Demo of the attack:
Clickjacking Vulnerabilities#
Clickjacking vulnerabilities are a way of convincing a user to perform a series of actions or clicks on a website, believing that they are performing one action, but they are actually unintentionally performing actions the attacker desires.
(...)
Impact#
Tóth's disclosed vulnerabilities enable hackers to steal sensitive data within password managers, such as credit card details, names, addresses, and phone numbers, if a victim visits a malicious website. Furthermore, if a vulnerable website storing your password manager credentials has a cross-site scripting (XSS) vulnerability or a subdomain takeover, hackers can exploit it to steal login credentials (usernames and passwords), 2FA codes, and passkeys.
As of August 19, 2025, the following versions have been confirmed as still vulnerable:
- Bitwarden: Bitwarden Password Manager: 2025.7.0 (Latest)
- 1Password: 1Password – Password Manager: 8.11.4.27 (Latest)
- LastPass: LastPass: 4.146.3 (Latest)
- LogMeOnce: LogMeOnce: 7.12.4 (Latest)
- Enpass: Enpass: 6.11.6 (Latest)
- Apple: iCloud Passwords: 3.1.25 (Latest)
Authors suggest two mitigations:
- Set only exact URL match for autofill credentials
- On click site access
Here is a demo of the second mitigation on the example of Bitwarden:
Last edited:

