GHSA-xfq4-78j7-v594

Suggest an improvement
Source
https://github.com/advisories/GHSA-xfq4-78j7-v594
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/04/GHSA-xfq4-78j7-v594/GHSA-xfq4-78j7-v594.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xfq4-78j7-v594
Aliases
Published
2024-04-26T03:30:29Z
Modified
2025-06-19T15:14:02.979189Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Passbolt Browser Extension leaks password information
Details

An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.

Database specific
{
    "nvd_published_at": "2024-04-26T01:15:46Z",
    "github_reviewed_at": "2025-06-19T14:30:34Z",
    "cwe_ids": [
        "CWE-200"
    ],
    "github_reviewed": true,
    "severity": "MODERATE"
}
References

Affected packages

npm / passbolt-browser-extension

Package

Name
passbolt-browser-extension
View open source insights on deps.dev
Purl
pkg:npm/passbolt-browser-extension

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.2