DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft

Date:

Share post:

Aug 20, 2025Ravie LakshmananVulnerability / Browser Security

Popular password manager plugins for web browsers have been found susceptible to clickjacking security vulnerabilities that could be exploited to steal account credentials, two-factor authentication (2FA) codes, and credit card details under certain conditions.

The technique has been dubbed Document Object Model (DOM)-based extension clickjacking by independent security researcher Marek Tóth, who presented the findings at the DEF CON 33 security conference earlier this month.

“A single click anywhere on an attacker-controlled website could allow attackers to steal users’ data (credit card details, personal data, login credentials, including TOTP),” Tóth said. “The new technique is general and can be applied to other types of extensions.”

Cybersecurity

Clickjacking, also called UI redressing, refers to a type of attack in which users are tricked into performing a series of actions on a website that appear ostensibly harmless, such as clicking on buttons, when, in reality, they are inadvertently carrying out the attacker’s bidding.

The new technique detailed by Tóth essentially involves using a malicious script to manipulate UI elements in a web page that browser extensions inject into the DOM — for example, auto-fill prompts, by making them invisible by setting their opacity to zero.

The research specifically focused on 11 popular password manager browser add-ons, ranging from 1Password to iCloud Passwords, all of which have been found to be susceptible to DOM-based extension clickjacking. Collectively, these extensions have millions of users.

To pull off the attack, all a bad actor has to do is create a fake site with an intrusive pop-up, such as a login screen or a cookie consent banner, while embedding an invisible login form such that clicking on the site to close the pop-up causes the credential information to be auto-filled by the password manager and exfiltrated to a remote server.

“All password managers filled credentials not only to the ‘main’ domain, but also to all subdomains,” Tóth explained. “An attacker could easily find XSS or other vulnerabilities and steal the user’s stored credentials with a single click (10 out of 11), including TOTP (9 out of 11). In some scenarios, passkey authentication could also be exploited (8 out of 11).”

Following responsible disclosure, six of the vendors have yet to release fixes for the defect –

  • 1Password Password Manager 8.11.4.27
  • Apple iCloud Passwords 3.1.25
  • Bitwarden Password Manager 2025.7.0
  • Enpass 6.11.6
  • LastPass 4.146.3
  • LogMeOnce 7.12.4
Identity Security Risk Assessment

Software supply chain security firm Socket, which independently reviewed the research, said Bitwarden, Enpass, and iCloud Passwords are actively working on fixes, while 1Password and LastPass marked them as informative. It has also reached out to US-CERT to assign CVE identifiers for the identified issues.

Until fixes are available, it’s advised that users disable the auto-fill function in their password managers and only use copy/paste.

“For Chromium-based browser users, it is recommended to configure site access to ‘on click’ in extension settings,” Tóth said. “This configuration allows users to manually control auto-fill functionality.”

Source link

spot_img

Related articles

Best Motherboards for Ryzen 9 5950X in 2025

The right motherboard can make all the difference in the performance of your PC. A good motherboard will...

Hybrid Event Challenges & Solutions in Australia & New Zealand

Hybrid events are now a mainstay in Australia and New Zealand’s event scene, but delivering a smooth and...

AI in Travel & Hospitality Solutions for Enterprises

Many travel and hospitality enterprises face challenges when trying to adopt AI – from fragmented systems and...

Gears of War, Dragon Age and Herdling Coming to Xbox Game Pass in August

Gears of War is one of the most iconic Xbox series, spawning sequels, spinoffs and books. I fell...