VYPR
High severity7.5NVD Advisory· Published Feb 11, 2026· Updated Apr 15, 2026

CVE-2020-37178

CVE-2020-37178

Description

KeePass Password Safe versions before 2.44 contain a denial of service vulnerability in the help system's HTML handling. Attackers can trigger the vulnerability by dragging and dropping malicious HTML files into the help area, potentially causing application instability or crash.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

KeePass Password Safe versions before 2.44 are vulnerable to denial of service via drag-and-drop of malicious HTML files into the help system.

Vulnerability

Overview

CVE-2020-37178 is a denial-of-service vulnerability in KeePass Password Safe versions prior to 2.44. The flaw resides in the help system's HTML handling, where improper control of code generation (CWE-94) allows an attacker to inject malicious scripts via crafted HTML files [1][3]. When a user drags and drops such a file into the help area, the application processes it unsafely, leading to instability or crash.

Exploitation

The attack requires local access and user interaction. An attacker must convince a user to drag and drop a specially crafted HTML file into the KeePass help interface (e.g., via the "About KeePass" dialog) [1]. No authentication is needed beyond the user's session, and the CVSS v4 vector indicates low attack complexity and no privileges required [3]. The exploit does not require network access, as the file is delivered locally.

Impact

Successful exploitation results in a denial of service, causing the application to become unstable or crash. There is no indication of data exfiltration or persistent compromise; the impact is limited to availability [3]. The vulnerability does not affect the password database integrity.

Mitigation

KeePass addressed this issue in version 2.44, released in early 2020. Users should upgrade to the latest version (currently 2.61.1 as of May 2026) to ensure protection [2]. No workarounds are documented; the only reliable fix is updating the software.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.