Important update: 24/08/2025 5h15 GMT+1
- Added
KeePassXC-Browser is vulnerable: please see the update original article here
- Updated
Bitwarden status, latest version (2025.8.1) still vulnerable (No ETA for the next update)
- Changed
1Password to
(the vulnerability also concerns your credit card info, please check the details)
- Changed
iCloud Password to
(the overlay vulnerability is the most likely to be exploited on naive users)
- Added links to screen recordings for each vulnerable password manager, showing the exploit in action
For now, make sure to turn off auto fill. If you’re using a Chromium web browser, you can also change the “Site access” setting of your password manager extension to “On click”.
And this is, once again, a good reminder to keep your 2FA/TOTP separated from your main device.
The complete changelog:
VULNERABLE 
1Password
Vulnerable version: <=8.11.7.2 (latest)
Vulnerable methods: Parent Element, Overlay Videos
Videos: opacity:0 opacity:0.5
In addition to the clickjacking vulnerability, 1Password has confusing texting in the dialog box when filling in a credit card. There is generic text “item”. The user may not know that it is a credit card.
https://websecurity.dev/video/1password_personaldata_creditcard.mp4
Improvement in 8.11.7.2: You can now choose to have 1Password ask before it autofills logins, credit cards, or other non-credential items in your browser. You can turn on “Ask before filling” for certain items under Settings > Security. Please see the accompanying security advisory.
Note: it is really advised to turn this setting on and deactivate auto fill. 
Bitwarden
Vulnerable version: <=2025.8.1 (latest)
Vulnerable methods: Overlay
Videos: opacity:0 + opacity:0.5
iCloud Passwords
Vulnerable version: 3.1.25 (latest)
Methods: Overlay
Videos: opacity:0 opacity:0.5Acknowledgements: August 2024 https://support.apple.com/en-us/122162
Fixed: Extension Element <2.3.22 (12.8.2024)
KeePassXC-Browser
Vulnerable releases: <=1.9.9.2 (latest)
Vulnerable methods: Extension Element, Overlay
Videos: opacity:0 + opacity:0.5 (1.9.9.2) / as seen in 1.9.9.1
LastPass
Vulnerable releases: 4.146.1 (latest)
Vulnerable methods: Extension Element, Parent Element, Overlay
Videos: opacity:0 opacity:0.5
Fixed: Credit Card, Personal Data <=4.125.0 (15.12.2023) / Note from commenter: no further update ahead, assume that it won’t be fixed.
LogMeOnce
Vulnerable releases: 7.12.4 (latest)
Vulnerable methods: Extension Element, Parent Element, Overlay
Videos: opacity:0 opacity:0.5
FIXED
Dashlane
Fixed: v6.2531.1 (1.8.2025)
Security Overview: https://support.dashlane.com/hc/en-us/articles/28598967624722-Advisory-Passkey-Dialog-Clickjacking-Issue
Enpass
Vulnerable version: 6.11.6 (latest)
Release Notes: https://www.enpass.io/release-notes/enpass-browser-extensions/
Vulnerable:
Parent Element, Overlay (<= 6.11.5)
Extension Element (<6.11.4.2)
Fixed Method: Extension Element <6.11.4.2 (19.5.2025)
Keeper
Fixed: 17.2.0
Vulnerable releases:
Extension Element <17.1.2 (26.5.2025)
Overlay <17.2.0 (25.7.2025)**
NordPass
Fixed: 5.13.24 (15.2.2024)
Proton Pass
Fixed: 1.31.6
Acknowledgements: https://proton.me/blog/protonmail-security-contributorsExtension
Vulnerable releases:
Element, Parent Element <1.9.5 (22.12.2023)
Extension Element <=1.31.0 (CRX)
Overlay <=1.31.4
RoboForm
Fixed: =<9.7.6 (25.7.2024)
Release Notes: https://www.roboform.com/news-ext-chrome
Vulnerable releases:
Extension Element <9.5.6 (7.12.2023)
Parent Element, Overlay <=9.7.5 (25.7.2024)
tl;dr: only web extensions are impacted.
Desktop and mobile apps are safe. Turn off autofill until a fix is released.
Finally, if it wasn’t the case already (assuming that your threat model requires it):
2FA should be strictly separated from login credentials - when storing everything in one place, so the attacker could exploit vulnerable password managers and gain access to the account even with 2FA enabled.