Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70050: n/a

0
Medium
VulnerabilityCVE-2025-70050cvecve-2025-70050
Published: Mon Mar 09 2026 (03/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue pertaining to CWE-312: Cleartext Storage of Sensitive Information was discovered in lesspass lesspass v9.6.9 which allows attackers to obtain sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 18:56:55 UTC

Technical Analysis

CVE-2025-70050 identifies a security vulnerability in lesspass version 9.6.9 related to CWE-312, which concerns the cleartext storage of sensitive information. Lesspass is a password management tool designed to generate passwords based on user inputs rather than storing them directly. However, in this version, sensitive data is stored in an unencrypted or insufficiently protected manner, allowing attackers who gain access to the storage medium or application data to retrieve sensitive information. The vulnerability is remotely exploitable without requiring privileges but does require user interaction, such as opening a malicious file or link. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) indicates network attack vector, low attack complexity, no privileges required, user interaction needed, unchanged scope, no confidentiality or integrity impact, but high impact on availability. This suggests that exploitation may cause denial of service or disruption of service rather than direct data theft or modification. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability highlights the risk of improper handling of sensitive data within password management solutions, which can undermine user trust and security if exploited. Organizations relying on lesspass v9.6.9 should be aware of this risk and prepare to apply patches or mitigations once available.

Potential Impact

The primary impact of CVE-2025-70050 is on the availability of the lesspass service or application, potentially causing denial of service or disruption. Although the vulnerability involves cleartext storage of sensitive information, the CVSS vector indicates no direct confidentiality or integrity loss, suggesting that attackers may not be able to extract or alter data easily but can disrupt service. This can affect organizations relying on lesspass for password management, leading to operational interruptions and potential loss of user trust. The lack of required privileges and the remote attack vector increase the risk of widespread exploitation once an exploit becomes available. The absence of patches further elevates the risk. Organizations may face increased support costs, user dissatisfaction, and potential compliance issues if sensitive data handling is compromised. The vulnerability also underscores the importance of secure data storage practices in security-critical applications.

Mitigation Recommendations

1. Immediately discontinue use of lesspass version 9.6.9 until a patched version is released. 2. Monitor official lesspass channels and CVE databases for updates or patches addressing CVE-2025-70050. 3. Implement additional encryption layers on storage media where lesspass data is stored to mitigate exposure from cleartext storage. 4. Restrict access to systems running lesspass to trusted users and networks to reduce attack surface. 5. Educate users about the risks of interacting with untrusted content that could trigger exploitation. 6. Consider alternative password management solutions with verified secure storage practices until this vulnerability is resolved. 7. Conduct regular audits of sensitive data storage and access controls within the organization. 8. Employ endpoint detection and response (EDR) tools to detect anomalous activities related to lesspass usage. 9. Backup critical data regularly to enable recovery in case of service disruption. 10. Review and update incident response plans to include scenarios involving password manager vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69aeeccc2904315ca31bf394

Added to database: 3/9/2026, 3:52:44 PM

Last enriched: 3/16/2026, 6:56:55 PM

Last updated: 4/23/2026, 9:19:58 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses