9.3
CVE-2025-1987
- EPSS 0.04%
- Veröffentlicht 21.06.2025 21:35:06
- Zuletzt bearbeitet 30.07.2025 18:59:12
- Quelle cve-requests@bitdefender.com
- Teams Watchlist Login
- Unerledigt Login
A Cross-Site Scripting (XSS) vulnerability has been identified in Psono-Client’s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim’s browser, potentially giving them access to the user’s password vault and sensitive data.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Esaqa ≫ Psono Client SwEdition- SwPlatform- Version <= 4.0.4
Bitdefender ≫ Securepass SwEditionweb_client SwPlatform- Version < 0.0.76
Bitdefender ≫ Securepass SwEditionsafari SwPlatform- Version < 1.0.10
Bitdefender ≫ Securepass SwEditionchrome SwPlatform- Version < 1.1.8
Bitdefender ≫ Securepass SwEditionedge SwPlatform- Version < 1.1.18
Bitdefender ≫ Securepass SwEditionfirefox SwPlatform- Version < 1.1.22
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.113 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
cve-requests@bitdefender.com | 9.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.