
Security researchers recently published details on unpatched clickjacking vulnerabilities in popular password managers with tens of millions of users. These vulnerabilities allow threat actors to steal data stored in the password managers, including credit card numbers, two-factor authentication codes, and account credentials. The vulnerabilities arise from abuse of native auto-fill capabilities within most password managers. When a user visits a website vulnerable to cache poisoning, attackers overlay the password manager interface with invisible HTML elements that can lead to sensitive data being leaked.
What’s Notable and Unique
- While abuse of autofill functionality in password managers is an established attack vector, the addition of overlay scripting to manipulate the user into enabling features represents a significant evolution. The primary method of attack is executing a script on a malicious or compromised website that masks the autofill dropdown menu of a browser-based password manager via overlays, opacity settings, or pointer-event techniques. In order to force the user to fill out forms with sensitive information, the attacker then overlays phony invasive components (such as popups, cookie banners, or CAPTCHA) so their clicks land on the concealed password manager controls.
- Threat actors who successfully exploit the password managers may then be able to escalate privileges within the company’s linked cloud environment in an Exchange hybrid deployment if they first obtain administrator access to an on-premises Exchange server without leaving any easily identified or auditable evidence.
- Eleven password managers were tested based on their popularity, and researchers discovered that each was susceptible to at least one attack technique. 1Password, Bitwarden, Enpass, iCloud Passwords, LastPass, and LogMeOnce were all vulnerable to multiple attack techniques.
Analyst Comments
Several impacted vendors initially rejected the security researchers’ claims and, therefore, did not apply patches for the activity when first notified in April 2025. The vendors claimed that the security researchers’ reports were about a general web risk. Many vendors have now reversed course and are working on applying patches. Those patches are not yet available at the time of this publication.
In the meantime, users are encouraged to disable autofill in their password managers. The use of autofill is typically not recommended by cybersecurity experts because threat actors can abuse it in a variety of ways to steal and monetize data. Enterprises can also invest in web application filtering capabilities to block disreputable, new, or other high-risk websites likely to be compromised in these types of attacks. Most defenses for clickjacking-based attacks rely on measures implemented on the website host’s side, so enterprises are best defended by preventing users from visiting less reputable websites.