Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70050: n/a

0
Unknown
VulnerabilityCVE-2025-70050cvecve-2025-70050
Published: Mon Mar 09 2026 (03/09/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue pertaining to CWE-312: Cleartext Storage of Sensitive Information was discovered in lesspass lesspass v9.6.9 which allows attackers to obtain sensitive information.

AI-Powered Analysis

AILast updated: 03/09/2026, 16:07:17 UTC

Technical Analysis

CVE-2025-70050 identifies a security vulnerability in lesspass version 9.6.9, a password management application, where sensitive information is stored in cleartext, violating secure storage principles (CWE-312). This vulnerability arises because the application fails to encrypt or otherwise protect sensitive data at rest, allowing attackers who gain access to the storage medium—whether local device storage or synced cloud storage—to retrieve sensitive credentials or secrets in plaintext form. The vulnerability does not require authentication or user interaction, meaning an attacker with access to the device or storage can exploit it without additional barriers. Although no exploits have been reported in the wild, the risk is significant due to the nature of the compromised data, which could lead to credential theft, unauthorized access to user accounts, and further compromise of organizational systems. The lack of a published patch or fix increases the urgency for users and organizations to implement compensating controls. The vulnerability was reserved in early 2026 and published shortly thereafter, indicating recent discovery and disclosure. The absence of a CVSS score necessitates an independent severity assessment based on impact and exploitability factors.

Potential Impact

The primary impact of CVE-2025-70050 is the compromise of confidentiality, as sensitive information such as passwords or secrets stored by lesspass can be retrieved in cleartext by attackers. This can lead to unauthorized access to user accounts, identity theft, and lateral movement within organizational networks if credentials are reused or linked to corporate resources. The integrity and availability of systems may be indirectly affected if attackers leverage stolen credentials to deploy malware or disrupt services. Organizations relying on lesspass for password management face increased risk of data breaches and compliance violations related to data protection standards. The ease of exploitation—requiring only access to stored data without authentication—amplifies the threat, especially in environments with weak endpoint security or shared devices. The lack of known exploits in the wild suggests the vulnerability is not yet actively weaponized, but the potential for targeted attacks remains high. The overall impact is significant for both individual users and enterprises that depend on lesspass for secure credential management.

Mitigation Recommendations

Until an official patch or update is released, organizations and users should take immediate steps to mitigate the risk posed by CVE-2025-70050. First, avoid using lesspass version 9.6.9 and downgrade to a previous secure version or switch to alternative password managers with verified secure storage. If continued use is necessary, restrict access to devices and storage locations where lesspass data is stored, employing full disk encryption and strong access controls. Regularly audit and monitor systems for unauthorized access attempts. Educate users on the risks of storing sensitive data in cleartext and encourage use of multi-factor authentication to reduce the impact of credential compromise. Backup sensitive data securely and consider manual encryption of stored secrets as a temporary measure. Organizations should prepare to deploy patches promptly once available and review their incident response plans to address potential credential theft scenarios. Finally, maintain awareness of updates from lesspass developers and security advisories related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69aeeccc2904315ca31bf394

Added to database: 3/9/2026, 3:52:44 PM

Last enriched: 3/9/2026, 4:07:17 PM

Last updated: 3/9/2026, 5:56:26 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses