Changeflow GovPing Data Privacy & Cybersecurity KeePassXC Vulnerability Allows Privilege Escala...
Priority review Notice Added Final

KeePassXC Vulnerability Allows Privilege Escalation

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 16th, 2026
Detected March 17th, 2026
Email

Summary

CERT-Bund has issued a security advisory for KeePassXC, detailing a vulnerability that allows local attackers to escalate privileges. The advisory affects versions prior to 2.7.12 on Linux, UNIX, and Windows systems.

What changed

CERT-Bund has released advisory WID-SEC-2026-0751 concerning a critical vulnerability in KeePassXC, a popular open-source password manager. The vulnerability, with a CVSS base score of 7.3, allows a local attacker to escalate their privileges on affected systems. This advisory applies to versions of KeePassXC earlier than 2.7.12, impacting users across Linux, UNIX, and Windows operating systems.

Users of KeePassXC are strongly advised to update to version 2.7.12 or later as soon as possible to mitigate the risk of privilege escalation. While the advisory indicates no remote attack vector, the potential for local privilege escalation poses a significant security risk to individual systems and potentially the networks they are connected to. Failure to update could lead to unauthorized access and further compromise of sensitive data.

What to do next

  1. Update KeePassXC to version 2.7.12 or later.
  2. Review system logs for any signs of unauthorized privilege escalation.

Source document (simplified)

[WID-SEC-2026-0751] KeePassXC: Schwachstelle ermöglicht Privilegieneskalation CVSS Base Score 7.3 (hoch) CVSS Temporal Score 6.6 (mittel) Remoteangriff nein Datum 16.03.2026 Stand 17.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • Linux
  • Sonstiges
  • UNIX
  • Windows

Produktbeschreibung

KeePass XC ist ein Open Source Passwortmanager für verschiedene Betriebssysteme.

Produkte

16.03.2026
- Open Source KeePassXC <2.7.12

Angriff

Angriff

Ein lokaler Angreifer kann eine Schwachstelle in KeePassXC ausnutzen, um seine Privilegien zu erhöhen. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 16th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Manufacturers Technology companies
Geographic scope
Germany Germany

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Software Vulnerabilities Privilege Escalation

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.