
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in KeePass (CVE-2022-0725) where plain text passwords were being logged in the system log when clearing the clipboard. The issue was identified on February 9, 2022, affecting KeePass installations on Linux systems (Bugzilla).
The vulnerability occurs when KeePass is started with specific clipboard handling workarounds enabled. The issue was found to be related to the interaction between KeePass and two Linux utilities: xsel and xdotool. When both utilities are installed, the password content is logged to system logs during clipboard clearing operations (Bugzilla).
The vulnerability leads to information exposure where plain text passwords are logged in system logs, making them potentially accessible to unauthorized users who have access to system logs (NVD).
The issue was resolved in KeePass version 2.54 by disabling clipboard workarounds by default. For earlier versions, users can mitigate the issue by using the command line parameter '-wa-disable:1530'. Additionally, updating xsel to version 1.2.1 also addresses the underlying issue (Bugzilla).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."