CVE-2024-33669

An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:passbolt:passbolt_browser_extension:*:*:*:*:*:*:*:*

History

18 Jun 2025, 19:26

Type Values Removed Values Added
CPE cpe:2.3:a:passbolt:passbolt_browser_extension:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.8
First Time Passbolt passbolt Browser Extension
Passbolt
References () https://www.passbolt.com/security/more - () https://www.passbolt.com/security/more - Product
References () https://help.passbolt.com/incidents/pwned-password-service-information-leak - () https://help.passbolt.com/incidents/pwned-password-service-information-leak - Issue Tracking, Vendor Advisory
References () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - () https://blog.quarkslab.com/passbolt-a-bold-use-of-haveibeenpwned.html - Third Party Advisory, Exploit
References () https://www.passbolt.com - () https://www.passbolt.com - Product
References () https://haveibeenpwned.com - () https://haveibeenpwned.com - Product

26 Apr 2024, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-26 01:15

Updated : 2025-06-18 19:26


NVD link : CVE-2024-33669

Mitre link : CVE-2024-33669


JSON object : View

Products Affected

passbolt

  • passbolt_browser_extension
CWE

No CWE.