CVE-2025-15554: CWE-525 Use of web browser cache containing sensitive information in Truesec LAPSWebUI
CVE-2025-15554 is a medium-severity vulnerability in Truesec's LAPSWebUI before version 2. 4 where sensitive local admin passwords are cached in the web browser. This caching allows an attacker with local access to a workstation to retrieve cached passwords and escalate privileges. Exploitation requires the attacker to have some level of authenticated access and user interaction. The vulnerability impacts confidentiality by exposing sensitive credentials, but does not affect integrity or availability directly. No known exploits are reported in the wild yet. Organizations using LAPSWebUI should upgrade to version 2. 4 or later and implement strict browser cache controls to mitigate risk. Countries with significant use of Truesec products and high reliance on local admin password management are most at risk.
AI Analysis
Technical Summary
CVE-2025-15554 is a vulnerability identified in Truesec's LAPSWebUI product, specifically in versions prior to 2.4. The root cause is the improper handling of sensitive information—local administrator passwords managed by LAPSWebUI—that are cached in the web browser. This caching behavior violates secure design principles by allowing sensitive credentials to be stored in a location accessible to other processes or users on the same workstation. The vulnerability is classified under CWE-525, which concerns the use of web browser cache containing sensitive information. An attacker with local access to a workstation where LAPSWebUI is used can exploit this flaw to retrieve cached passwords and escalate their privileges to local administrator level. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), privileges (PR:L), and user interaction (UI:P). The vulnerability has a high impact on confidentiality (VC:H) but no impact on integrity or availability. The scope is high (SI:H), meaning the vulnerability affects components beyond the initially vulnerable component, and security requirements for integrity and availability are high (SI:H, SA:H). No known exploits have been reported in the wild, but the risk remains significant due to the sensitive nature of the cached credentials. The vulnerability was published on March 16, 2026, and assigned by NCSC-FI. There are no patch links provided, but upgrading to LAPSWebUI version 2.4 or later is implied as a remediation step.
Potential Impact
The primary impact of CVE-2025-15554 is the compromise of local administrator credentials through browser cache disclosure. This can lead to privilege escalation on affected workstations, enabling attackers to gain full control over local systems. Such access can facilitate lateral movement within an organization's network, potentially leading to broader compromise. Confidentiality is severely impacted as sensitive passwords are exposed. While integrity and availability are not directly affected by this vulnerability, the elevated privileges gained can be leveraged to disrupt or manipulate systems. Organizations relying on LAPSWebUI for local admin password management face increased risk of insider threats or attackers who gain initial local access. The vulnerability could undermine trust in endpoint security controls and complicate incident response efforts. Although no active exploits are known, the ease of exploitation with local access and user interaction means that attackers with limited privileges could escalate quickly, increasing the threat surface.
Mitigation Recommendations
To mitigate CVE-2025-15554, organizations should immediately upgrade Truesec LAPSWebUI to version 2.4 or later, where the caching issue is resolved. Additionally, implement strict browser cache control policies, such as disabling caching for sensitive web application pages via HTTP headers (e.g., Cache-Control: no-store, no-cache, must-revalidate). Enforce endpoint security measures that restrict local user access and monitor for unusual privilege escalation attempts. Use application whitelisting and endpoint detection and response (EDR) tools to detect suspicious access to cached browser data. Educate users about the risks of leaving sessions open and encourage logging out after use. Regularly audit local workstations for cached sensitive data and clear browser caches periodically. Consider isolating LAPSWebUI access to dedicated secure workstations with hardened configurations to reduce exposure. Finally, implement multi-factor authentication and least privilege principles to limit the impact of compromised credentials.
Affected Countries
United States, Finland, Germany, United Kingdom, Canada, Australia, Sweden, Netherlands, Norway, France
CVE-2025-15554: CWE-525 Use of web browser cache containing sensitive information in Truesec LAPSWebUI
Description
CVE-2025-15554 is a medium-severity vulnerability in Truesec's LAPSWebUI before version 2. 4 where sensitive local admin passwords are cached in the web browser. This caching allows an attacker with local access to a workstation to retrieve cached passwords and escalate privileges. Exploitation requires the attacker to have some level of authenticated access and user interaction. The vulnerability impacts confidentiality by exposing sensitive credentials, but does not affect integrity or availability directly. No known exploits are reported in the wild yet. Organizations using LAPSWebUI should upgrade to version 2. 4 or later and implement strict browser cache controls to mitigate risk. Countries with significant use of Truesec products and high reliance on local admin password management are most at risk.
AI-Powered Analysis
Technical Analysis
CVE-2025-15554 is a vulnerability identified in Truesec's LAPSWebUI product, specifically in versions prior to 2.4. The root cause is the improper handling of sensitive information—local administrator passwords managed by LAPSWebUI—that are cached in the web browser. This caching behavior violates secure design principles by allowing sensitive credentials to be stored in a location accessible to other processes or users on the same workstation. The vulnerability is classified under CWE-525, which concerns the use of web browser cache containing sensitive information. An attacker with local access to a workstation where LAPSWebUI is used can exploit this flaw to retrieve cached passwords and escalate their privileges to local administrator level. The CVSS 4.0 vector indicates that the attack requires local access (AV:L), low attack complexity (AC:L), privileges (PR:L), and user interaction (UI:P). The vulnerability has a high impact on confidentiality (VC:H) but no impact on integrity or availability. The scope is high (SI:H), meaning the vulnerability affects components beyond the initially vulnerable component, and security requirements for integrity and availability are high (SI:H, SA:H). No known exploits have been reported in the wild, but the risk remains significant due to the sensitive nature of the cached credentials. The vulnerability was published on March 16, 2026, and assigned by NCSC-FI. There are no patch links provided, but upgrading to LAPSWebUI version 2.4 or later is implied as a remediation step.
Potential Impact
The primary impact of CVE-2025-15554 is the compromise of local administrator credentials through browser cache disclosure. This can lead to privilege escalation on affected workstations, enabling attackers to gain full control over local systems. Such access can facilitate lateral movement within an organization's network, potentially leading to broader compromise. Confidentiality is severely impacted as sensitive passwords are exposed. While integrity and availability are not directly affected by this vulnerability, the elevated privileges gained can be leveraged to disrupt or manipulate systems. Organizations relying on LAPSWebUI for local admin password management face increased risk of insider threats or attackers who gain initial local access. The vulnerability could undermine trust in endpoint security controls and complicate incident response efforts. Although no active exploits are known, the ease of exploitation with local access and user interaction means that attackers with limited privileges could escalate quickly, increasing the threat surface.
Mitigation Recommendations
To mitigate CVE-2025-15554, organizations should immediately upgrade Truesec LAPSWebUI to version 2.4 or later, where the caching issue is resolved. Additionally, implement strict browser cache control policies, such as disabling caching for sensitive web application pages via HTTP headers (e.g., Cache-Control: no-store, no-cache, must-revalidate). Enforce endpoint security measures that restrict local user access and monitor for unusual privilege escalation attempts. Use application whitelisting and endpoint detection and response (EDR) tools to detect suspicious access to cached browser data. Educate users about the risks of leaving sessions open and encourage logging out after use. Regularly audit local workstations for cached sensitive data and clear browser caches periodically. Consider isolating LAPSWebUI access to dedicated secure workstations with hardened configurations to reduce exposure. Finally, implement multi-factor authentication and least privilege principles to limit the impact of compromised credentials.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NCSC-FI
- Date Reserved
- 2026-02-02T05:56:44.566Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69b7e4169d4df451835079ca
Added to database: 3/16/2026, 11:05:58 AM
Last enriched: 3/16/2026, 11:20:32 AM
Last updated: 3/16/2026, 12:09:43 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.