A Cross-Site Scripting (XSS) vulnerability has been identified in Psono-Client’s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim’s browser, potentially giving them access to the user’s password vault and sensitive data.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Jul 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitdefender
Bitdefender securepass |
|
CPEs | cpe:2.3:a:bitdefender:securepass:*:*:*:*:chrome:-:*:* cpe:2.3:a:bitdefender:securepass:*:*:*:*:edge:-:*:* cpe:2.3:a:bitdefender:securepass:*:*:*:*:firefox:-:*:* cpe:2.3:a:bitdefender:securepass:*:*:*:*:safari:-:*:* cpe:2.3:a:bitdefender:securepass:*:*:*:*:web_client:-:*:* |
|
Vendors & Products |
Bitdefender
Bitdefender securepass |
Wed, 30 Jul 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Esaqa
Esaqa psono Client |
|
CPEs | cpe:2.3:a:esaqa:psono_client:*:*:*:*:-:-:*:* | |
Vendors & Products |
Esaqa
Esaqa psono Client |
|
Metrics |
cvssV3_1
|
Mon, 23 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 21 Jun 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Cross-Site Scripting (XSS) vulnerability has been identified in Psono-Client’s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim’s browser, potentially giving them access to the user’s password vault and sensitive data. | |
Title | Stored XSS in Psono-Client via Malicious Vault Entry URLs | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Bitdefender
Published: 2025-06-21T21:35:06.643Z
Updated: 2025-06-23T14:56:45.902Z
Reserved: 2025-03-05T14:48:09.124Z
Link: CVE-2025-1987

Updated: 2025-06-23T14:56:41.352Z

Status : Analyzed
Published: 2025-06-21T22:15:21.510
Modified: 2025-07-30T18:59:12.797
Link: CVE-2025-1987

No data.