CVE-2023-24055

MEDIUM EXPLOITED

KeePass <2.53 - Info Disclosure

Title source: llm

Description

KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.

Exploits (7)

nomisec WORKING POC 255 stars
by alt3kx · local
https://github.com/alt3kx/CVE-2023-24055_PoC
nomisec WORKING POC 65 stars
by deetl · infoleak
https://github.com/deetl/CVE-2023-24055
nomisec SCANNER 1 stars
by Cyb3rtus · poc
https://github.com/Cyb3rtus/keepass_CVE-2023-24055_yara_rule
nomisec WORKING POC 1 stars
by zwlsix · local
https://github.com/zwlsix/KeePass-CVE-2023-24055
nomisec WORKING POC 1 stars
by julesbozouklian · infoleak
https://github.com/julesbozouklian/PoC_CVE-2023-24055
nomisec WRITEUP
by digital-dev · poc
https://github.com/digital-dev/KeePass-TriggerLess
nomisec WORKING POC
by yosef0x01 · poc
https://github.com/yosef0x01/CVE-2023-24055

Scores

CVSS v3 5.5
EPSS 0.4144
EPSS Percentile 97.4%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-04-24
CWE
CWE-312
Status published
Products (1)
keepass/keepass < 2.53
Published Jan 22, 2023
Tracked Since Feb 18, 2026