I understand that if you have Bitwarden (or any password manager or browser) configured to autofill your password when it encounters a “password” field on a web form, an easy exploit is for the web form to have hidden form fields (e.g., address, phone, email, ssn) and your autofill app will fill in your info into those fields, even though you only wanted it to autofill the login.

But when you have autofill turned off and you click in a form’s “login” field and select a login from Bitwrden’s contextual menu, Bitwarden automatically also fills in the “Password” field. Does this mean that the exploit exists even if autofill is turned off, as long as you’re using any form of an “auto-fill” function?

You are viewing a single thread.
View all comments View context
2 points

Bitwarden does have address fields, and it also had custom fields so you can define any field you want (SSN, etc).

It may not be a good thing to store such info there, but my question is about what happens when you do store that info.

Also, it’s possible to have a login/password for a site but not give them your address, etc.

permalink
report
parent
reply
3 points

as far as i know, bitwarden stores data on a per-site basis, so unless you saved custom fields for that specific site in the past the app won’t give it private data from another site

permalink
report
parent
reply

Bitwarden

!bitwarden@discuss.tchncs.de

Create post

Discuss the Paswordmanager Bitwarden.

Community stats

  • 375

    Monthly active users

  • 37

    Posts

  • 193

    Comments

Community moderators