Skip to content
Dicussion Hub
Menu
  • About Us
  • Contact
  • Terms and Conditions
  • Privacy Policy
Menu

Critical flaw uncovered in Passwordstate credential manager — immediate patching urged

Posted on December 4, 2025December 4, 2025 by gunkan

The developer behind Passwordstate—an enterprise-grade password manager used to secure organizations’ most sensitive credentials—is urging customers to immediately apply a newly released update that addresses a high-severity flaw. The vulnerability allows attackers to bypass authentication and potentially obtain administrative control over protected vaults.

The flaw enables an attacker to craft a specific URL that grants access to Passwordstate’s emergency access page. From there, a threat actor could escalate privileges and move into the administrative interface of the platform. A CVE identifier has not yet been assigned for the issue.

Protecting organizations’ most sensitive credentials

Click Studios, the Australia-based company behind Passwordstate, reports that the platform is used by 29,000 customers and 370,000 security professionals worldwide. Passwordstate is specifically built to safeguard critical enterprise credentials, offering features such as integration with Active Directory, password rotation and reset functionality, event auditing, and secure remote session logins.

On Thursday, Click Studios announced the rollout of an update that fixes two security vulnerabilities affecting Passwordstate.

According to the company, the authentication bypass flaw is “associated with accessing the core Passwordstate products’ Emergency Access page using a carefully crafted URL, which could allow access to the Passwordstate Administration section.” Click Studios classified the vulnerability as high severity. More details were published in its security advisory.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Dodging return-to-office rules is getting harder—and employers are noticing
  • Law enforcement and military radio encryption may be far easier to crack than expected
  • The GPT-5 launch has been chaotic—and users are letting OpenAI know it
  • High-severity WinRAR 0-day exploited for weeks by separate threat groups
  • Why asking chatbots about their own mistakes leads to unreliable answers
©2025 Dicussion Hub | Design: Newspaperly WordPress Theme