CVE-2024-33669: n/a
CVE-2024-33669 is a medium severity vulnerability in the Passbolt Browser Extension prior to version 4. 6. 2. The extension sends multiple requests to the HaveIBeenPwned (HIBP) API while a user types a password, causing an information leak. An attacker who can observe these HTTPS queries can gain insights that facilitate brute forcing the manually typed passwords. The vulnerability does not require authentication but does require user interaction (typing a password). It impacts confidentiality by leaking password-related information, though it does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using Passbolt Browser Extension should update to version 4. 6.
AI Analysis
Technical Summary
CVE-2024-33669 is a vulnerability identified in the Passbolt Browser Extension versions before 4.6.2. The extension integrates with the HaveIBeenPwned (HIBP) Pwned Password API to check if user passwords have been compromised in known breaches. However, the extension sends multiple API requests while the user is still typing their password, rather than waiting for completion. This behavior results in an information leak because an attacker capable of monitoring the HTTPS traffic between the extension and the HIBP API can observe partial password queries. These observations can be used to significantly reduce the search space for brute forcing the password, effectively weakening password confidentiality. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.1 (medium severity), reflecting the high confidentiality impact but requiring user interaction and having attack complexity high due to the need to observe HTTPS traffic. The vulnerability does not affect integrity or availability and does not require privileges or authentication. No patches are linked in the provided data, but upgrading to Passbolt Browser Extension 4.6.2 or later is recommended to resolve this issue.
Potential Impact
This vulnerability primarily impacts the confidentiality of user passwords managed via the Passbolt Browser Extension. Attackers with network visibility—such as those on the same local network, compromised routers, or capable of performing man-in-the-middle attacks—can intercept the HTTPS queries to the HIBP API and glean partial password information. This leakage can facilitate more efficient brute force or guessing attacks against user passwords, potentially leading to unauthorized access to user accounts or systems protected by these passwords. Organizations relying on Passbolt for password management may face increased risk of credential compromise, especially if users type passwords in environments where network traffic can be monitored. While the vulnerability does not directly impact system integrity or availability, the resulting credential exposure can lead to broader security incidents, including account takeover and lateral movement within networks.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should upgrade the Passbolt Browser Extension to version 4.6.2 or later, where this issue has been addressed. Until the update is applied, users should avoid typing passwords in environments where network traffic can be monitored or intercepted, such as unsecured public Wi-Fi networks. Network administrators should enforce the use of encrypted and trusted networks and consider deploying network security controls such as HTTPS inspection prevention and strict TLS enforcement to reduce the risk of traffic interception. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of potential password compromise. Monitoring network traffic for unusual patterns and educating users about secure password entry practices can further reduce risk. Finally, reviewing and limiting the exposure of password checking APIs and ensuring that extensions handle password data securely without leaking partial inputs are critical development best practices.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, Netherlands, Sweden, Japan, South Korea
CVE-2024-33669: n/a
Description
CVE-2024-33669 is a medium severity vulnerability in the Passbolt Browser Extension prior to version 4. 6. 2. The extension sends multiple requests to the HaveIBeenPwned (HIBP) API while a user types a password, causing an information leak. An attacker who can observe these HTTPS queries can gain insights that facilitate brute forcing the manually typed passwords. The vulnerability does not require authentication but does require user interaction (typing a password). It impacts confidentiality by leaking password-related information, though it does not affect integrity or availability. No known exploits are currently reported in the wild. Organizations using Passbolt Browser Extension should update to version 4. 6.
AI-Powered Analysis
Technical Analysis
CVE-2024-33669 is a vulnerability identified in the Passbolt Browser Extension versions before 4.6.2. The extension integrates with the HaveIBeenPwned (HIBP) Pwned Password API to check if user passwords have been compromised in known breaches. However, the extension sends multiple API requests while the user is still typing their password, rather than waiting for completion. This behavior results in an information leak because an attacker capable of monitoring the HTTPS traffic between the extension and the HIBP API can observe partial password queries. These observations can be used to significantly reduce the search space for brute forcing the password, effectively weakening password confidentiality. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 6.1 (medium severity), reflecting the high confidentiality impact but requiring user interaction and having attack complexity high due to the need to observe HTTPS traffic. The vulnerability does not affect integrity or availability and does not require privileges or authentication. No patches are linked in the provided data, but upgrading to Passbolt Browser Extension 4.6.2 or later is recommended to resolve this issue.
Potential Impact
This vulnerability primarily impacts the confidentiality of user passwords managed via the Passbolt Browser Extension. Attackers with network visibility—such as those on the same local network, compromised routers, or capable of performing man-in-the-middle attacks—can intercept the HTTPS queries to the HIBP API and glean partial password information. This leakage can facilitate more efficient brute force or guessing attacks against user passwords, potentially leading to unauthorized access to user accounts or systems protected by these passwords. Organizations relying on Passbolt for password management may face increased risk of credential compromise, especially if users type passwords in environments where network traffic can be monitored. While the vulnerability does not directly impact system integrity or availability, the resulting credential exposure can lead to broader security incidents, including account takeover and lateral movement within networks.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should upgrade the Passbolt Browser Extension to version 4.6.2 or later, where this issue has been addressed. Until the update is applied, users should avoid typing passwords in environments where network traffic can be monitored or intercepted, such as unsecured public Wi-Fi networks. Network administrators should enforce the use of encrypted and trusted networks and consider deploying network security controls such as HTTPS inspection prevention and strict TLS enforcement to reduce the risk of traffic interception. Additionally, organizations should implement multi-factor authentication (MFA) to reduce the impact of potential password compromise. Monitoring network traffic for unusual patterns and educating users about secure password entry practices can further reduce risk. Finally, reviewing and limiting the exposure of password checking APIs and ensuring that extensions handle password data securely without leaking partial inputs are critical development best practices.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-26T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c44b7ef31ef0b561c0f
Added to database: 2/25/2026, 9:40:20 PM
Last enriched: 2/26/2026, 4:33:20 AM
Last updated: 2/26/2026, 9:39:18 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.