Description
Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords.
Published: 2026-03-16
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local privilege escalation by exposure of cached administrator passwords
Action: Apply Workaround
AI Analysis

Impact

The vulnerability present in Truesec LAPSWebUI versions prior to 2.4 allows an attacker who can access a workstation to obtain locally‑stored administrator passwords that the browser caches. Because the passwords are stored in a way that the browser automatically caches them, the attacker can read these credentials from the cache, gaining privileged access without needing to compromise the LAPS system itself. The weakness aligns with CWE‑525, related to disclosure of sensitive information from local state, and results in a moderate‑to‑high impact of local privilege escalation.

Affected Systems

Truesec LAPSWebUI versions earlier than 2.4 are affected. The flaw is specific to the web interface that leaves passwords in a cacheable HTTP response, exposing them to any user who has logged into the browser on that workstation. Version 2.4 and later eliminate the caching behavior and resolve the issue.

Risk and Exploitability

The CVSS base score of 6.0 indicates this flaw is of moderate severity. The EPSS score of less than 1% suggests that the current likelihood of exploitation is low, and the issue is not listed in the CISA KEV catalog. Nonetheless, exploitation requires the attacker to have access to a workstation where the user has logged into LAPSWebUI, after which the attacker can retrieve cached passwords via the browser’s developer tools or cache files. The presence of a simple HTTP header workaround and a patchable upgrade path mitigates the risk.

Generated by OpenCVE AI on March 22, 2026 at 14:46 UTC.

Remediation

Vendor Workaround

Make sure the web server hosting LAPSWebUI sets the following HTTP response header: Cache-Control: no-store


OpenCVE Recommended Actions

  • Upgrade Truesec LAPSWebUI to version 2.4 or later.
  • Configure the web server to send Cache-Control: no-store header to prevent browsers from caching passwords.
  • Check the vendor’s website for the latest security patches and monitor advisories for additional updates.

Generated by OpenCVE AI on March 22, 2026 at 14:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:truesec:lapswebui:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Truesec
Truesec lapswebui
Vendors & Products Truesec
Truesec lapswebui

Mon, 16 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
Description Browser caching of LAPS passwords in Truesec’s LAPSWebUI before version 2.4 allows an attacker with access to a workstation to escalate their privileges via disclosure of local admin passwords.
Title Admin Passwords Cached by Browsers in Truesec LAPSWebUI
Weaknesses CWE-525
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H'}


Subscriptions

Truesec Lapswebui
cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC-FI

Published:

Updated: 2026-03-16T12:35:35.519Z

Reserved: 2026-02-02T05:56:44.566Z

Link: CVE-2025-15554

cve-icon Vulnrichment

Updated: 2026-03-16T11:17:26.566Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:17:56.427

Modified: 2026-04-07T00:50:55.053

Link: CVE-2025-15554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:02:49Z

Weaknesses