Today, we are releasing KeePassXC 2.7.6 with a few bug fixes and enhancements. This version fixes a crash on macOS that occurred on exit. We also improved the visual display when dragging entries to move/copy, Quick Unlock is now automatically activated when unlocking for Auto-Type or Browser access, and the Auto-Type button and shortcut key will be disabled when Auto-Type is turned off for the entry or group.
Your passwords remain encrypted at all times and no data is stored on remote servers, so you stay in full control of your data. No cloud, no ads, no subscriptions.
Every feature is thoroughly tested on Windows, macOS, and Linux, so you can expect a seamless experience no matter which operating system you use.
The source code is completely open source under the GPLv3 license and openly available on GitHub. Feel free to inspect, share, and contribute!
KeePassXC is a modern, secure, and open-source password manager that stores and manages your most sensitive information.
You can run KeePassXC on Windows, macOS, and Linux systems. KeePassXC is for people with extremely high demands of secure personal data management. It saves many types of information, such as usernames, passwords, URLs, attachments, and notes in an offline, encrypted file that can be stored in any location, including private and public cloud solutions.
How to Get Started
Our Getting Started Guide walks you through the steps of downloading and installing KeePassXC for Windows, macOS, or Linux. Additionally, many Linux distributions ship their own versions, so in that case please check your distribution's package list.
Recent Blog Posts
On June 19, 2023 an alleged KeePassXC vulnerability with the identifier CVE-2023–35866 was posted against KeePassXC versions up to 2.7.5. As the developers of KeePassXC, we do not consider the issue a vulnerability and have filed a request for the CVE to be rejected. Additional information can be found in the discussion on GitHub.
The root of the argument submitted by the CVE author is that an attacker with unfettered access to an already unlocked database could export or change the password without requiring the original credentials. Where this is true, there are numerous barriers to actually executing this attack sequence. In addition, having lost control of your computer in this manner would mean the attacker could execute any number of security compromises against your KeePassXC database, regardless of requiring credentials prior to export or credential change.
At this time, we are not planning any drastic changes to the program to address this submission. We are also monitoring the request to reject/dispute this CVE on the grounds it is not actually a vulnerability in our software. Information on mitigation and other factors is included after the break.
Today, we are releasing KeePassXC 2.7.5 with a bunch of bug fixes and performance improvements. This version fixes three separate crashes that were found with the support of our active community members. Additionally, we fixed several areas in the code that were causing significant slow downs when databases had more than a thousand entries.
This release brings several popular feature requests including a menu option to temporarily allow screen capture (Windows & macOS), an improved layout to the HTML export, improved KeePassXC logos and icons, and increasing the max TOTP step to 24 hours.
An audit of KeePassXC has been on the wish list since we started this project over six years ago. Today we are happy to announce the release of an audit conducted by Zaur Molotnikov, an independent security consultant, that was completed on January 19, 2023 against KeePassXC 2.7.4. This audit was conducted free of charge to the KeePassXC Team and the findings and writeup were reviewed for correctness.