{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-3876","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","dateUpdated":"2025-04-15T12:56:56.284Z","dateReserved":"2022-11-07T00:00:00.000Z","datePublished":"2022-12-19T00:00:00.000Z"},"containers":{"cna":{"title":"Click Studios Passwordstate API authorization","providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2022-12-19T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This issue affects some unknown processing of the file /api/browserextension/UpdatePassword/ of the component API. The manipulation of the argument PasswordID leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216245 was assigned to this vulnerability."}],"affected":[{"vendor":"Click Studios","product":"Passwordstate","versions":[{"version":"n/a","status":"affected"}]},{"vendor":"Click Studios","product":"Passwordstate Browser Extension Chrome","versions":[{"version":"n/a","status":"affected"}]}],"references":[{"url":"https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html"},{"url":"https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf"},{"url":"https://vuldb.com/?id.216245"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-266 Incorrect Privilege Assignment -> CWE-285 Improper Authorization -> CWE-639 Authorization Bypass","cweId":"CWE-266"}]}],"x_generator":"vuldb.com"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T01:20:58.476Z"},"title":"CVE Program Container","references":[{"url":"https://modzero.com/modlog/archives/2022/12/19/better_make_sure_your_password_manager_is_secure/index.html","tags":["x_transferred"]},{"url":"https://www.modzero.com/static/MZ-22-03_Passwordstate_Security_Disclosure_Report-v1.0.pdf","tags":["x_transferred"]},{"url":"https://vuldb.com/?id.216245","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-14T16:54:38.247729Z","id":"CVE-2022-3876","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-15T12:56:56.284Z"}}]}}