Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33669: n/a

0
Medium
VulnerabilityCVE-2024-33669cvecve-2024-33669
Published: Fri Apr 26 2024 (04/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Passbolt Browser Extension before 4.6.2. It can send multiple requests to HaveIBeenPwned while a password is being typed, which results in an information leak. This allows an attacker capable of observing Passbolt's HTTPS queries to the Pwned Password API to more easily brute force passwords that are manually typed by the user.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 04:33:20 UTC

Technical Analysis

CVE-2024-33669 is a vulnerability identified in the Passbolt Browser Extension versions before 4.6.2. The extension integrates with the HaveIBeenPwned (HIBP) Pwned Password API to check if user passwords have been compromised in known breaches. However, the extension sends multiple API requests while the user is still typing their password, rather than waiting for completion. This behavior results in an information leak because an attacker capable of monitoring the HTTPS traffic between the extension and the HIBP API can observe partial password queries. These observations can be used to significantly reduce the search space for brute forcing the password, effectively weakening password confidentiality. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.1 (medium severity), reflecting the high confidentiality impact but requiring user interaction and having attack complexity high due to the need to observe HTTPS traffic. The vulnerability does not affect integrity or availability and does not require privileges or authentication. No patches are linked in the provided data, but upgrading to Passbolt Browser Extension 4.6.2 or later is recommended to resolve this issue.

Potential Impact

This vulnerability primarily impacts the confidentiality of user passwords managed via the Passbolt Browser Extension. Attackers with network visibility—such as those on the same local network, compromised routers, or capable of performing man-in-the-middle attacks—can intercept the HTTPS queries to the HIBP API and glean partial password information. This leakage can facilitate more efficient brute force or guessing attacks against user passwords, potentially leading to unauthorized access to user accounts or systems protected by these passwords. Organizations relying on Passbolt for password management may face increased risk of credential compromise, especially if users type passwords in environments where network traffic can be monitored. While the vulnerability does not directly impact system integrity or availability, the resulting credential exposure can lead to broader security incidents, including account takeover and lateral movement within networks.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should upgrade the Passbolt Browser Extension to version 4.6.2 or later, where this issue has been addressed. Until the update is applied, users should avoid typing passwords in environments where network traffic can be monitored or intercepted, such as unsecured public Wi-Fi networks. Network administrators should enforce the use of encrypted and trusted networks and consider deploying network security controls such as HTTPS inspection prevention and strict TLS enforcement to reduce the risk of traffic interception. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of potential password compromise. Monitoring network traffic for unusual patterns and educating users about secure password entry practices can further reduce risk. Finally, reviewing and limiting the exposure of password checking APIs and ensuring that extensions handle password data securely without leaking partial inputs are critical development best practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c44b7ef31ef0b561c0f

Added to database: 2/25/2026, 9:40:20 PM

Last enriched: 2/26/2026, 4:33:20 AM

Last updated: 4/11/2026, 10:05:34 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses