News: 1756473229

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Enterprise password management outfit Passwordstate patches Emergency Access bug

(2025/08/29)


Australian development house Click Studios has warned users of its Passwordstate enterprise password management platform to update immediately if not sooner, following the discovery of an authentication bypass vulnerability that opens the doors to an emergency administration account with nothing more than a "carefully crafted URL."

"We have released [Passwordstate] build 9972," Click Studio's support team posted to the company's [1]announcements board , "which includes two security updates. We recommend customers upgrade as soon as possible."

Those two security updates are detailed in the company's [2]changelog as modifications to prevent clickjacking attacks against the software's browser extension and a "potential authentication bypass" which, at the time of writing, was pending the assignment of a CVE ID.

[3]

In a separate [4]security advisories page , Click Studios goes into slightly more detail. Creating "a carefully crafted URL" allows attackers to access the Passwordstate Emergency Access portal, which is designed to provide ingress into the software when other accounts have been locked out or are otherwise inaccessible. "This account doesn't allocate a license from your available license pool," the company's documentation explains, "and is not intended for use in day to day operations. It should be regarded as an account of last resort."

Will passkeys ever replace passwords? Can they? [5]READ MORE

For attackers, though, it seems to be very much an account of first resort. With nothing more than the "carefully crafted URL" and a web browser, attackers can bypass the authentication requirement of the Emergency Access portal – giving full administrator-level access to the Passwordstate installation, albeit at the cost of triggering email alerts to all registered security administrators on the system.

The flaw impacts a not-inconsiderable number of users worldwide. According to the latest figures released by Click Studios, Passwordstate is used in over 29,000 organizations and by 370,000 "security and IT professionals" in fields including government, banking and finance, insurance, healthcare, legal, utilities, mining, and, perhaps most worryingly, defense. These include Tasmania's Department of Health, which has been using the product since 2016 - though many of the company's customers choose to keep their use of the Passwordstate software a private matter.

[6]Tested: Microsoft Recall can still capture credit cards and passwords, a treasure trove for crooks

[7]Users left scrambling for a plan B as Dropbox drops Dropbox Passwords

[8]Phishing platforms, infostealers blamed as identity attacks soar

[9]Bitwarden switches password manager and SDK to GPL3 after FOSS-iness drama

This latest vulnerability is the fourth authentication bypass flaw to hit Passwordstate 9 since its release, following the discovery of CVE-2022-3876 and CVE-2022-3875 in 2022 and CVE-2024-39337 in 2024. Its severity has, naturally enough given the ease of exploitation, been rated as "high," though for partial mitigation Passwordstate advises - though does not require - that administrators restrict access to the Emergency Access portal by IP address specifically to avoid its misuse in the event of exactly this kind of issue.

Passwordstate 9 users looking to protect themselves from the vulnerability are advised to install Build 9972 or later to receive the patch, along with the related clickjacking fix. ®

Get our [10]Tech Resources



[1] https://forums.clickstudios.com.au/topic/27316-passwordstate-build-9972-released/

[2] https://www.clickstudios.com.au/passwordstate-changelog.aspx

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aLHOlzSDfC_4SyVw9YS99gAAAE0&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[4] https://www.clickstudios.com.au/security/advisories/

[5] https://www.theregister.com/2024/11/17/passkeys_passwords/

[6] https://www.theregister.com/2025/08/01/microsoft_recall_captures_credit_card_info/

[7] https://www.theregister.com/2025/07/30/dropbox_drops_dropbox_passwords/

[8] https://www.theregister.com/2025/07/07/phishing_platforms_infostealers_blamed_for/

[9] https://www.theregister.com/2024/11/04/bitwarden_gpls_password_manager/

[10] https://whitepapers.theregister.com/



The is only one thing worse than not having a password manager

Anonymous Coward

and that appears to be having a password manager.

Your mode of life will be changed for the better because of good news soon.