search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple Password Managers Vulnerable to Clickjacking Attacks

Vulnerability Note VU#516608

Original Release Date: 2025-10-17 | Last Revised: 2025-10-17

Overview

Browser-extension password managers, which autofill sensitive information on websites, can be exposed to various clickjacking attacks. These attacks exploit the trust relationship between a web page and the user-interface elements injected by the extension. Recent studies show that Document Object Model (DOM-level) manipulation can bypass many standard clickjacking defenses, leaving several password managers at risk when users navigate to a malicious or compromised website. Users should promptly install vendor updates and carefully weigh the security risks of using password-manager features such as autofill of sensitive information that trade convenience for potential exposure

Description

Clickjacking is a malicious technique that usually involves tricking a user into clicking something that looks safe or normal to interact with so that an attacker can gain some kind of sensitive information or perform an action that they otherwise would not be able to do.

Though clickjacking is a well known attack that has many mitigations across many product areas, novel methods of execution still appear. Unlike traditional iframe-based clickjacking attacks, DOM-based clickjacking exploits the fact that browser extensions can sometimes allow interactive elements to be injected directly into a website's DOM. DOM is desribed in stands MDN Web Docs as

the data representation of the objects that comprise the structure and content of a document on the web. It represents the page so that programs can change the document structure, style, and content. The DOM represents the document as nodes and objects; that way, programming languages can interact with the page (MDN Web Docs).

Since JavaScript has the ability to manipulate the visual elements injected by a browser extension, these elements can be made invisible to the user while preserving click handlers so that attackers can trick users to interact with password manager extension functions. This behavior can be guided by website elements that users are already feel safe and familiar with such as cookie consent banners, pop-up ads, or CAPTCHA prompts.

Password managers inject user-interface elements into web pages to enable autofill functionality, creating an inherent tension between usability and security. Clickjacking exploits rely on user interaction with maliciously crafted content, making responsibility for mitigation a shared concern. Effective defenses require coordinated effort: web developers must implement clickjacking protections, password-manager vendors must harden extension behavior, and users must understand and manage residual risk. No single party can eliminate the vulnerability on its own.

Impact

Successful clickjacking of a browser-extension password manager could allow an attacker to trick users into unintentionally revealing or auto-filling credentials, leading to unauthorized access to sensitive accounts and stored passwords. Because DOM-based techniques can bypass common defenses, multiple browsers and password-manager vendors remain variably exposed while mitigations continue to evolve.

Solution

Review the Vendor Information section for any browser or password manager extension specific updates and mitigation steps. Apply the latest updates from both the browser and the password-manager extension vendors. Where applicable, users should consider disabling or limiting autofill functionality or adjusting related settings to reduce exposure when concerned about clickjacking exposure. Users must also recognize that the level of control may vary from product-to-product, and that clickjacking attempts may occur on trusted websites if they have been compromised.

Acknowledgements

Thanks to Marek Tóth in presenting the research and Jonathan Leitschuh for reporting this research to us. This document was written by Ben Koo.

Vendor Information

516608
 

AgileBits Unknown

Notified:  2025-08-18 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.

Apple Unknown

Notified:  2025-08-18 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.

BitWarden, Inc. Unknown

Notified:  2025-08-18 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.

Dashlane Unknown

Notified:  2025-08-22 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.

Enpass Technologies Inc. Unknown

Notified:  2025-08-18 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.

LastPass Unknown

Notified:  2025-08-18 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.

LogMeOnce Unknown

Notified:  2025-08-18 Updated: 2025-10-17

VU#516608.1 Unknown

Vendor Statement

We have not received a statement from the vendor.


Other Information

API URL: VINCE JSON | CSAF
Date Public: 2025-10-17
Date First Published: 2025-10-17
Date Last Updated: 2025-10-17 11:46 UTC
Document Revision: 1

Sponsored by CISA.