Vulnerability Details : CVE-2023-27974
Potential exploit
Bitwarden through 2023.2.1 offers password auto-fill when the second-level domain matches, e.g., a password stored for an example.com hosting provider when customer-website.example.com is visited. NOTE: the vendor's position is that "Auto-fill on page load" is not enabled by default.
Products affected by CVE-2023-27974
- cpe:2.3:a:bitwarden:bitwarden:*:*:*:*:browser:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-27974
0.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 51 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-27974
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
References for CVE-2023-27974
-
https://github.com/bitwarden/clients/releases
Releases · bitwarden/clients · GitHubRelease Notes
-
https://news.ycombinator.com/item?id=35075861
Bitwarden flaw can let hackers steal passwords using iframes | Hacker NewsThird Party Advisory
-
https://flashpoint.io/blog/bitwarden-password-pilfering/
Bitwarden: The Curious (Use-)Case of Password Pilfering | FlashpointExploit;Third Party Advisory
Jump to