DOM-Based Clickjacking Vulnerability Threatens Popular Password Managers, Exposing Users to Credential and Data Theft

AUGUST 20, 2025
Vulnerability / Browser Security

Recent findings reveal that widely used password manager browser extensions are vulnerable to DOM-based clickjacking attacks, which can compromise users’ account credentials, two-factor authentication (2FA) codes, and credit card information under specific conditions. Independent security researcher Marek Tóth highlighted this risk during his presentation at DEF CON 33 earlier this month. “With just a single click on an attacker-controlled site, users’ sensitive data—including credit card details, personal information, and login credentials (including TOTP)—can be stolen,” Tóth explained. This new technique is versatile and could potentially target other extension types as well. Clickjacking, also known as UI redressing, involves manipulating users into executing seemingly benign actions on a website, while the real intent is to hijack their information.

DOM-Based Extension Clickjacking Poses Risks to Leading Password Managers

On August 20, 2025, new findings emerged highlighting a significant security vulnerability affecting popular password management extensions for web browsers. These vulnerabilities, known as DOM-based extension clickjacking, could potentially facilitate the theft of sensitive user information, including account credentials, two-factor authentication (2FA) codes, and credit card details.

The technique was unveiled by security researcher Marek Tóth during his presentation at the DEF CON 33 security conference earlier this month. Tóth articulated the gravity of the situation, stating that a single click on a maliciously controlled website could grant attackers access to a user’s sensitive data. “The implications of this technique are extensive and not limited to just password managers; it can be applied to various other extension types,” Tóth noted.

Clickjacking, often referred to as UI redressing, involves deceiving users into executing actions on a website that seem benign, such as clicking buttons, which could ultimately compromise their data. This emerging threat underscores a growing concern among business owners and cybersecurity professionals alike regarding the robustness of browser extensions that are generally trusted for secure data management.

The targeted entities primarily include users of widely adopted password manager tools, many of which are utilized to enhance security through encrypted storage of passwords and other credentials. These extensions are commonly employed by individuals and organizations in the United States, relying on their convenience and perceived safety.

In terms of attack methodology, the MITRE ATT&CK framework offers a valuable lens for understanding the tactics and techniques involved in these vulnerabilities. Initial access may be gained through user interaction with a malicious web page, potentially leading to a persistence mechanism where attackers maintain control over the compromised information. Furthermore, privilege escalation techniques could allow attackers to access more sensitive data that users believe is adequately protected.

As organizations increasingly rely on digital tools for managing sensitive information, the implications of such vulnerabilities are far-reaching. The findings raise critical questions about the need for tighter security measures and oversight in the development and deployment of browser extensions that interface with personal data.

In light of these revelations, business owners are encouraged to stay vigilant and proactive in assessing the security of the tools they employ for data management. Regular updates, user education on safe browsing practices, and an understanding of potential vulnerabilities can significantly mitigate risks associated with these emerging threats. As the cybersecurity landscape evolves, it is crucial to remain informed and prepared to adapt to new challenges that could compromise organizational integrity.

Source link