We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-27582



Description

The Secure Password extension in One Identity Password Manager before 5.14.4 allows local privilege escalation. The issue arises from a flawed security hardening mechanism within the kiosk browser used to display the Password Self-Service site to end users. Specifically, the application attempts to restrict privileged actions by overriding the native window.print() function. However, this protection can be bypassed by an attacker who accesses the Password Self-Service site from the lock screen and navigates to an attacker-controlled webpage via the Help function. By hosting a crafted web page with JavaScript, the attacker can restore and invoke the window.print() function, launching a SYSTEM-privileged print dialog. From this dialog, the attacker can exploit standard Windows functionality - such as the Print to PDF or Add Printer wizard - to spawn a command prompt with SYSTEM privileges. Successful exploitation allows a local attacker (with access to a locked workstation) to gain SYSTEM-level privileges, granting full control over the affected device.

Reserved 2025-03-03 | Published 2025-07-14 | Updated 2025-07-14 | Assigner mitre


HIGH: 7.6CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-829 Inclusion of Functionality from Untrusted Control Sphere

Product status

Default status
unaffected

Any version before 5.14.4
affected

References

www.cyberis.com/...cle/password-manager-privilege-escalation

cve.org (CVE-2025-27582)

nvd.nist.gov (CVE-2025-27582)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-27582

Support options

Helpdesk Chat, Email, Knowledgebase