A Cross-Site Scripting (XSS) vulnerability has been identified in Psono-Client’s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim’s browser, potentially giving them access to the user’s password vault and sensitive data.
History

Wed, 30 Jul 2025 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Bitdefender
Bitdefender securepass
CPEs cpe:2.3:a:bitdefender:securepass:*:*:*:*:chrome:-:*:*
cpe:2.3:a:bitdefender:securepass:*:*:*:*:edge:-:*:*
cpe:2.3:a:bitdefender:securepass:*:*:*:*:firefox:-:*:*
cpe:2.3:a:bitdefender:securepass:*:*:*:*:safari:-:*:*
cpe:2.3:a:bitdefender:securepass:*:*:*:*:web_client:-:*:*
Vendors & Products Bitdefender
Bitdefender securepass

Wed, 30 Jul 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Esaqa
Esaqa psono Client
CPEs cpe:2.3:a:esaqa:psono_client:*:*:*:*:-:-:*:*
Vendors & Products Esaqa
Esaqa psono Client
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Mon, 23 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sat, 21 Jun 2025 21:45:00 +0000

Type Values Removed Values Added
Description A Cross-Site Scripting (XSS) vulnerability has been identified in Psono-Client’s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim’s browser, potentially giving them access to the user’s password vault and sensitive data.
Title Stored XSS in Psono-Client via Malicious Vault Entry URLs
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Bitdefender

Published: 2025-06-21T21:35:06.643Z

Updated: 2025-06-23T14:56:45.902Z

Reserved: 2025-03-05T14:48:09.124Z

Link: CVE-2025-1987

cve-icon Vulnrichment

Updated: 2025-06-23T14:56:41.352Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-21T22:15:21.510

Modified: 2025-07-30T18:59:12.797

Link: CVE-2025-1987

cve-icon Redhat

No data.