CVE-2020-37178
Description
KeePass Password Safe versions before 2.44 contain a denial of service vulnerability in the help system's HTML handling. Attackers can trigger the vulnerability by dragging and dropping malicious HTML files into the help area, potentially causing application instability or crash.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
KeePass Password Safe versions before 2.44 are vulnerable to denial of service via drag-and-drop of malicious HTML files into the help system.
Vulnerability
Overview
CVE-2020-37178 is a denial-of-service vulnerability in KeePass Password Safe versions prior to 2.44. The flaw resides in the help system's HTML handling, where improper control of code generation (CWE-94) allows an attacker to inject malicious scripts via crafted HTML files [1][3]. When a user drags and drops such a file into the help area, the application processes it unsafely, leading to instability or crash.
Exploitation
The attack requires local access and user interaction. An attacker must convince a user to drag and drop a specially crafted HTML file into the KeePass help interface (e.g., via the "About KeePass" dialog) [1]. No authentication is needed beyond the user's session, and the CVSS v4 vector indicates low attack complexity and no privileges required [3]. The exploit does not require network access, as the file is delivered locally.
Impact
Successful exploitation results in a denial of service, causing the application to become unstable or crash. There is no indication of data exfiltration or persistent compromise; the impact is limited to availability [3]. The vulnerability does not affect the password database integrity.
Mitigation
KeePass addressed this issue in version 2.44, released in early 2020. Users should upgrade to the latest version (currently 2.61.1 as of May 2026) to ensure protection [2]. No workarounds are documented; the only reliable fix is updating the software.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <2.44
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.