KeePassXC Vulnerability Allows Privilege Escalation
Summary
CERT-Bund has issued a security advisory for KeePassXC, detailing a vulnerability that allows local attackers to escalate privileges. The advisory affects versions prior to 2.7.12 on Linux, UNIX, and Windows systems.
What changed
CERT-Bund has released advisory WID-SEC-2026-0751 concerning a critical vulnerability in KeePassXC, a popular open-source password manager. The vulnerability, with a CVSS base score of 7.3, allows a local attacker to escalate their privileges on affected systems. This advisory applies to versions of KeePassXC earlier than 2.7.12, impacting users across Linux, UNIX, and Windows operating systems.
Users of KeePassXC are strongly advised to update to version 2.7.12 or later as soon as possible to mitigate the risk of privilege escalation. While the advisory indicates no remote attack vector, the potential for local privilege escalation poses a significant security risk to individual systems and potentially the networks they are connected to. Failure to update could lead to unauthorized access and further compromise of sensitive data.
What to do next
- Update KeePassXC to version 2.7.12 or later.
- Review system logs for any signs of unauthorized privilege escalation.
Source document (simplified)
[WID-SEC-2026-0751] KeePassXC: Schwachstelle ermöglicht Privilegieneskalation CVSS Base Score 7.3 (hoch) CVSS Temporal Score 6.6 (mittel) Remoteangriff nein Datum 16.03.2026 Stand 17.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Linux
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
KeePass XC ist ein Open Source Passwortmanager für verschiedene Betriebssysteme.
Produkte
16.03.2026
- Open Source KeePassXC <2.7.12
Angriff
Angriff
Ein lokaler Angreifer kann eine Schwachstelle in KeePassXC ausnutzen, um seine Privilegien zu erhöhen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.