teampass CVE Vulnerabilities & Metrics

Focus on teampass vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About teampass Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with teampass. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total teampass CVEs: 40
Earliest CVE date: 22 Apr 2012, 03:44 UTC
Latest CVE date: 10 Jul 2023, 16:15 UTC

Latest CVE reference: CVE-2023-3565

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical teampass CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.0

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 25
4.0-6.9 15
7.0-8.9 5
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS teampass CVEs

These are the five CVEs with the highest CVSS scores for teampass, sorted by severity first and recency.

All CVEs for teampass

CVE-2023-3565 teampass vulnerability CVSS: 0 10 Jul 2023, 16:15 UTC

Cross-site Scripting (XSS) - Generic in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

CVE-2023-3553 teampass vulnerability CVSS: 0 08 Jul 2023, 09:15 UTC

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

CVE-2023-3552 teampass vulnerability CVSS: 0 08 Jul 2023, 09:15 UTC

Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

CVE-2023-3551 teampass vulnerability CVSS: 0 08 Jul 2023, 09:15 UTC

Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

CVE-2023-3531 teampass vulnerability CVSS: 0 06 Jul 2023, 20:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.10.

CVE-2023-3191 teampass vulnerability CVSS: 0 10 Jun 2023, 09:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-3190 teampass vulnerability CVSS: 0 10 Jun 2023, 09:15 UTC

Improper Encoding or Escaping of Output in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-3095 teampass vulnerability CVSS: 0 04 Jun 2023, 11:15 UTC

Improper Access Control in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-3086 teampass vulnerability CVSS: 0 03 Jun 2023, 12:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-3084 teampass vulnerability CVSS: 0 03 Jun 2023, 11:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-3083 teampass vulnerability CVSS: 0 03 Jun 2023, 08:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-3009 teampass vulnerability CVSS: 0 31 May 2023, 13:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-2859 teampass vulnerability CVSS: 0 24 May 2023, 08:15 UTC

Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.

CVE-2023-2591 teampass vulnerability CVSS: 0 09 May 2023, 10:15 UTC

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitHub repository nilsteampassnet/teampass prior to 3.0.7.

CVE-2023-2516 teampass vulnerability CVSS: 0 05 May 2023, 19:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.

CVE-2023-2021 teampass vulnerability CVSS: 0 13 Apr 2023, 12:15 UTC

Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.3.

CVE-2023-1545 teampass vulnerability CVSS: 0 21 Mar 2023, 11:15 UTC

SQL Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.

CVE-2023-1463 teampass vulnerability CVSS: 0 17 Mar 2023, 12:15 UTC

Authorization Bypass Through User-Controlled Key in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.

CVE-2023-1070 teampass vulnerability CVSS: 0 27 Feb 2023, 16:15 UTC

External Control of File Name or Path in GitHub repository nilsteampassnet/teampass prior to 3.0.0.22.

CVE-2022-26980 teampass vulnerability CVSS: 4.3 28 Mar 2022, 19:15 UTC

Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO.

CVE-2020-11671 teampass vulnerability CVSS: 5.8 04 May 2020, 14:15 UTC

Lack of authorization controls in REST API functions in TeamPass through 2.1.27.36 allows any TeamPass user with a valid API token to become a TeamPass administrator and read/modify all passwords via authenticated api/index.php REST API calls. NOTE: the API is not available by default.

CVE-2020-12479 teampass vulnerability CVSS: 6.5 29 Apr 2020, 22:15 UTC

TeamPass 2.1.27.36 allows any authenticated TeamPass user to trigger a PHP file include vulnerability via a crafted HTTP request with sources/users.queries.php newValue directory traversal.

CVE-2020-12478 teampass vulnerability CVSS: 5.0 29 Apr 2020, 22:15 UTC

TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.

CVE-2020-12477 teampass vulnerability CVSS: 5.0 29 Apr 2020, 22:15 UTC

The REST API functions in TeamPass 2.1.27.36 allow any user with a valid API token to bypass IP address whitelist restrictions via an X-Forwarded-For client HTTP header to the getIp function.

CVE-2019-17205 teampass vulnerability CVSS: 4.3 05 Oct 2019, 22:15 UTC

TeamPass 2.1.27.36 allows Stored XSS by placing a payload in the username field during a login attempt. When an administrator looks at the log of failed logins, the XSS payload will be executed.

CVE-2019-17204 teampass vulnerability CVSS: 3.5 05 Oct 2019, 22:15 UTC

TeamPass 2.1.27.36 allows Stored XSS by setting a crafted Knowledge Base label and adding any available item.

CVE-2019-17203 teampass vulnerability CVSS: 3.5 05 Oct 2019, 22:15 UTC

TeamPass 2.1.27.36 allows Stored XSS at the Search page by setting a crafted password for an item in any folder.

CVE-2019-16904 teampass vulnerability CVSS: 3.5 26 Sep 2019, 12:15 UTC

TeamPass 2.1.27.36 allows Stored XSS by setting a crafted password for an item in a common available folder or sharing the item with an admin. (The crafted password is exploitable when viewing the change history of the item or tapping on the item.)

CVE-2019-12950 teampass vulnerability CVSS: 3.5 06 Aug 2019, 17:15 UTC

An issue was discovered in TeamPass 2.1.27.35. From the sources/items.queries.php "Import items" feature, it is possible to load a crafted CSV file with an XSS payload.

CVE-2019-1000001 teampass vulnerability CVSS: 5.0 04 Feb 2019, 21:29 UTC

TeamPass version 2.1.27 and earlier contains a Storing Passwords in a Recoverable Format vulnerability in Shared password vaults that can result in all shared passwords are recoverable server side. This attack appears to be exploitable via any vulnerability that can bypass authentication or role assignment and can lead to shared password leakage.

CVE-2017-15055 teampass vulnerability CVSS: 6.5 27 Nov 2017, 19:29 UTC

TeamPass before 2.1.27.9 does not properly enforce item access control when requesting items.queries.php. It is then possible to copy any arbitrary item into a directory controlled by the attacker, edit any item within a read-only directory, delete an arbitrary item, delete the file attachments of an arbitrary item, copy the password of an arbitrary item to the copy/paste buffer, access the history of an arbitrary item, and edit attributes of an arbitrary directory. To exploit the vulnerability, an authenticated attacker must tamper with the requests sent directly, for example by changing the "item_id" parameter when invoking "copy_item" on items.queries.php.

CVE-2017-15054 teampass vulnerability CVSS: 6.5 27 Nov 2017, 19:29 UTC

An arbitrary file upload vulnerability, present in TeamPass before 2.1.27.9, allows remote authenticated users to upload arbitrary files leading to Remote Command Execution. To exploit this vulnerability, an authenticated attacker has to tamper with parameters of a request to upload.files.php, in order to select the correct branch and be able to upload any arbitrary file. From there, it can simply access the file to execute code on the server.

CVE-2017-15053 teampass vulnerability CVSS: 4.0 27 Nov 2017, 19:29 UTC

TeamPass before 2.1.27.9 does not properly enforce manager access control when requesting roles.queries.php. It is then possible for a manager user to modify any arbitrary roles within the application, or delete any arbitrary role. To exploit the vulnerability, an authenticated attacker must have the manager rights on the application, then tamper with the requests sent directly, for example by changing the "id" parameter when invoking "delete_role" on roles.queries.php.

CVE-2017-15052 teampass vulnerability CVSS: 4.0 27 Nov 2017, 19:29 UTC

TeamPass before 2.1.27.9 does not properly enforce manager access control when requesting users.queries.php. It is then possible for a manager user to delete an arbitrary user (including admin), or modify attributes of any arbitrary user except administrator. To exploit the vulnerability, an authenticated attacker must have the manager rights on the application, then tamper with the requests sent directly, for example by changing the "id" parameter when invoking "delete_user" on users.queries.php.

CVE-2017-15051 teampass vulnerability CVSS: 3.5 27 Nov 2017, 19:29 UTC

Multiple stored cross-site scripting (XSS) vulnerabilities in TeamPass before 2.1.27.9 allow authenticated remote attackers to inject arbitrary web script or HTML via the (1) URL value of an item or (2) user log history. To exploit the vulnerability, the attacker must be first authenticated to the application. For the first one, the attacker has to simply inject XSS code within the URL field of a shared item. For the second one however, the attacker must prepare a payload within its profile, and then ask an administrator to modify its profile. From there, whenever the administrator accesses the log, it can be XSS'ed.

CVE-2017-15278 teampass vulnerability CVSS: 3.5 12 Oct 2017, 08:29 UTC

Cross-Site Scripting (XSS) was discovered in TeamPass before 2.1.27.9. The vulnerability exists due to insufficient filtration of data (in /sources/folders.queries.php). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.

CVE-2017-9436 teampass vulnerability CVSS: 7.5 05 Jun 2017, 14:29 UTC

TeamPass before 2.1.27.4 is vulnerable to a SQL injection in users.queries.php.

CVE-2015-7564 teampass vulnerability CVSS: 7.5 12 Apr 2017, 22:59 UTC

Multiple SQL injection vulnerabilities in TeamPass 2.1.24 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id parameter in an action_on_quick_icon action to item.query.php or the (2) order or (3) direction parameter in an (a) connections_logs, (b) errors_logs or (c) access_logs action to view.query.php.

CVE-2015-7563 teampass vulnerability CVSS: 6.8 12 Apr 2017, 22:59 UTC

Cross-site request forgery (CSRF) vulnerability in TeamPass 2.1.24 and earlier allows remote attackers to hijack the authentication of an authenticated user.

CVE-2015-7562 teampass vulnerability CVSS: 4.3 12 Apr 2017, 22:59 UTC

Multiple cross-site scripting (XSS) vulnerabilities in TeamPass 2.1.24 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) label value of an item or (2) name of a role.

CVE-2014-3774 teampass vulnerability CVSS: 4.3 07 Aug 2014, 11:13 UTC

Multiple cross-site scripting (XSS) vulnerabilities in items.php in TeamPass before 2.1.20 allow remote attackers to inject arbitrary web script or HTML via the group parameter, which is not properly handled in a (1) hid_cat or (2) open_folder form element, or (3) id parameter, which is not properly handled in the open_id form element.

CVE-2014-3773 teampass vulnerability CVSS: 7.5 07 Aug 2014, 11:13 UTC

Multiple SQL injection vulnerabilities in TeamPass before 2.1.20 allow remote attackers to execute arbitrary SQL commands via the login parameter in a (1) send_pw_by_email or (2) generate_new_password action in sources/main.queries.php; iDisplayStart parameter to (3) datatable.logs.php or (4) a file in source/datatable/; or iDisplayLength parameter to (5) datatable.logs.php or (6) a file in source/datatable/; or allow remote authenticated users to execute arbitrary SQL commands via a sSortDir_ parameter to (7) datatable.logs.php or (8) a file in source/datatable/.

CVE-2014-3772 teampass vulnerability CVSS: 7.5 07 Aug 2014, 11:13 UTC

TeamPass before 2.1.20 allows remote attackers to bypass access restrictions via a request to index.php followed by a direct request to a file that calls the session_start function before checking the CPM key, as demonstrated by a request to sources/upload/upload.files.php.

CVE-2014-3771 teampass vulnerability CVSS: 7.5 07 Aug 2014, 11:13 UTC

TeamPass before 2.1.20 allows remote attackers to bypass access restrictions via the language file path in a (1) request to index.php or (2) "change_user_language" request to sources/main.queries.php.

CVE-2012-2234 teampass vulnerability CVSS: 4.3 22 Apr 2012, 03:44 UTC

Cross-site scripting (XSS) vulnerability in sources/users.queries.php in TeamPass before 2.1.6 allows remote authenticated users to inject arbitrary web script or HTML via the login parameter in an add_new_user action.