Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A High-Severity Vulnerability in Passwordstate Credential Manager: A Wake-Up Call for Enterprise Organizations


A critical vulnerability has been discovered in Passwordstate, a popular password manager used by enterprise organizations worldwide. Read more about the severity of the issue, the recommended solution, and the importance of keeping software up-to-date with the latest patches.

  • Ars Technica discovered a high-severity vulnerability in Passwordstate, allowing hackers to bypass authentication protocols and gain administrative access.
  • The vulnerability is currently unpatched and available for exploitation, posing significant risks to enterprise organizations using the product.
  • Click Studios has released an update that patches two vulnerabilities, including the high-severity authentication bypass vulnerability.
  • Enterprise organizations are urged to install the updated version immediately to safeguard their most privileged credentials.
  • The incident highlights the importance of keeping software up-to-date with the latest patches to prevent security breaches.



  • Ars Technica has issued a stern warning to enterprise organizations that rely on Passwordstate, a popular password manager, after discovering a high-severity vulnerability that could allow hackers to gain administrative access to customer vaults. The vulnerability, which is currently unpatched and available for exploitation, enables attackers to bypass authentication protocols and create a URL that accesses an emergency access page, from where they can pivot to the administrative section of the password manager.

    According to Click Studios, the developer of Passwordstate, the credential manager is used by 29,000 customers and 370,000 security professionals worldwide. The product is designed to safeguard organizations' most privileged and sensitive credentials, integrating with Active Directory and handling tasks such as password resets, event auditing, and remote session logins.

    However, the recent discovery of this high-severity vulnerability has raised significant concerns among enterprise organizations that rely on Passwordstate for managing their employees' credentials. The vulnerability is described as "associated with accessing the core Passwordstate Products' Emergency Access page, by using a carefully crafted URL, which could allow access to the Passwordstate Administration section," according to Click Studios.

    In response to this critical finding, Click Studios has released an update that patches two vulnerabilities, including the high-severity authentication bypass vulnerability. The updated version of Passwordstate is recommended for immediate installation by anyone who uses the product to safeguard their most privileged credentials.

    It's worth noting that this vulnerability comes at a time when enterprise organizations are already facing significant security threats, and it highlights the importance of keeping software up-to-date with the latest patches. In 2021, Click Studios suffered a network breach that allowed attackers to compromise the Passwordstate update mechanism, leading to the deployment of malicious code that ran in memory only.

    This incident serves as a reminder to enterprise organizations to prioritize their password manager security and take proactive measures to prevent similar breaches in the future. The recent discovery of this high-severity vulnerability in Passwordstate credential manager is a wake-up call for these organizations to patch now and protect their sensitive credentials.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/A-High-Severity-Vulnerability-in-Passwordstate-Credential-Manager-A-Wake-Up-Call-for-Enterprise-Organizations-ehn.shtml

  • https://arstechnica.com/security/2025/08/high-severity-vulnerability-in-passwordstate-credential-manager-patch-now/

  • https://www.newsdirectory3.com/passwordstate-vulnerability-critical-patch-now-available/


  • Published: Thu Aug 28 16:20:52 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us