Password manager autofill suddenly feels “unsafe”: how to reduce clickjacking risk (and keep logging in smoothly) in 2026

Try this
In the last year, security researchers publicly demonstrated how clickjacking (UI redress) can trick people into triggering password-manager autofill on a malicious or compromised webpage—potentially leaking credentials, 2FA codes, or payment details. Vendors have responded with patches and safer “confirm before fill” options, but many users still have risky defaults enabled. This guide focuses on practical settings you can change today to reduce exposure while keeping logins convenient.

Password manager autofill suddenly feels “unsafe”: a fix-first playbook for clickjacking risk (2026)

The problem (and who this hits)

If you use a password manager browser extension (1Password, Bitwarden, Proton Pass, LastPass, iCloud Passwords, etc.), you probably rely on autofill to move fast. The issue: recent research and conference talks showed that clickjacking (also called UI redress) can sometimes trick users into clicking invisible or disguised elements on a webpage—potentially triggering autofill in a way you didn’t intend.

This affects:


  • Anyone who uses password-manager browser extensions and regularly visits new sites (shopping, coupons, forums, travel, PDF viewers, etc.).

  • People who store more than passwords—like credit cards, identities, or 2FA codes—inside the password manager.

  • Small businesses where staff share devices or work in a high-tab, high-distraction browser workflow.

The goal isn’t panic. It’s to make autofill safer by default and reduce “one misclick” risk.

Why it’s happening (based on sources)

Clickjacking is a well-known web attack pattern where a malicious page uses transparent layers/overlays to trick you into clicking something you can’t clearly see. OWASP defines clickjacking as a UI redress technique using transparent or opaque layers to mislead clicks. [6]

In 2025, researcher Marek Tóth demonstrated clickjacking-style attacks targeting password-manager autofill behavior, and cybersecurity firm Socket verified the research according to multiple security news reports. [4] Many vendors then shipped mitigations.

Two important nuances:
1. This doesn’t “decrypt your vault.” For example, 1Password states clickjacking doesn’t expose your vault contents wholesale; rather, the risk is tricking you into an autofill action for a matching item. [1]
2. Browsers and extensions share responsibility. Some vendors note clickjacking is ultimately a browser-level class of problem, but extensions can add safer prompts and controls to reduce the chance of silent fills. [1]

Fix-first: practical ways to reduce risk (without giving up convenience)

Solution 1: Turn on “confirm before autofill” (or equivalent)

Best for: People who store credit cards/identities/TOTP in the manager.

What to do:
1. Open your password manager extension settings.
2. Look for options like “Confirm before fill,” “Approve autofill,” “Require user interaction,” or “Show confirmation prompts.”
3. Enable confirmations for:
- Passwords/logins (if available)
- Credit cards
- Identities
- One-time codes (if applicable)

Example: 1Password describes an update that adds an option to be notified and approve/deny autofill actions, extending confirmation-style prompts. [1]

Solution 2: Change extension site access to “On click” (Chromium browsers)

Best for: Chrome / Edge / Brave users with many extensions.

This reduces background interaction with pages and forces you to intentionally invoke the extension.

Steps (Chrome/Edge-like browsers):
1. Go to Extensions.
2. Find your password manager.
3. Open its Site access settings.
4. Choose “On click” (or the closest equivalent).

Security reporting around the 2025 clickjacking research also recommended limiting extension access and controlling autofill invocation more explicitly (especially on Chromium-based browsers). [4]

Solution 3: Use “copy/paste” or manual fill for high-risk items

Best for: When you’re on a sketchy site, in a rush, or dealing with popups.

Do this when:


  • The page looks visually odd (unexpected overlays, misaligned buttons, sudden “Verify you’re human” popups).

  • You arrived via a link in an email, ad, or DM.

Steps:
1. Don’t autofill directly into the page.
2. Open the password manager UI.
3. Copy username/password.
4. Paste into fields.

Yes, it’s slower—but it’s a reliable “safe mode.”

Solution 4: Update the extension/app (vendors have shipped mitigations)

Best for: Everyone.

Updates matter here because vendors have released targeted changes after disclosure.

Examples:


  • 1Password advises updating to versions that add more user-visible autofill controls and confirmations. [1]

  • Proton Pass states it addressed a reported clickjacking vulnerability and recommends updating to a specific version (notably v1.31.6 for the web app). [2]

  • Keeper documents timeline and fixes in its extension releases following the DEF CON clickjacking report. [3]

Steps:
1. Update your browser.
2. Update the password manager extension in the browser store.
3. Update the desktop/mobile app if you use it for unlock/biometrics.

Solution 5: Reduce what autofill can leak (data hygiene)

Best for: People who store lots of personal data in the vault.

1. Consider not storing:
- Full card details (or at least remove rarely-used cards)
- Identity items you never autofill
2. Separate “everyday logins” from “sensitive vault items” (if your manager supports vaults/collections).
3. Use device-level protections (screen lock, biometrics) so the manager isn’t unlocked casually.

Quick checklist (do this in 15 minutes)

  • [ ] Update browser + password manager extension/app.
  • [ ] Enable “confirm/approve before fill” (especially for credit cards and identities).
  • [ ] Set extension site access to On click (Chromium browsers) if available.
  • [ ] Disable autofill on unfamiliar sites; use copy/paste instead.
  • [ ] Audit vault items: remove old cards/identities you don’t need in autofill.
  • [ ] If something looks off on a page, stop and re-check the domain before filling.

FAQ

1) Can clickjacking steal my entire vault?

Generally, no. Vendors emphasize that vault encryption isn’t broken by clickjacking; the risk is being tricked into filling specific items via the browser UI. [1]

2) Is this only a Chrome problem?

No—clickjacking is a web/browser UI class of issue. However, browser-extension behavior and controls vary, so your risk depends on your browser, extension settings, and how autofill is triggered. [1]

3) What’s the single safest setting change?

Enable confirmation/approval prompts before autofill, especially for non-credential items like cards and identities. Many vendor mitigations focus on making fills user-visible and harder to silently trigger. [1]

4) Should I stop using password managers?

For most people, no. Password managers still meaningfully reduce password reuse and improve security. The practical move is to keep using one, but tighten autofill controls and update regularly. [4]

5) How do I recognize a clickjacking attempt?

It can be subtle: odd overlays, “dead” buttons, unexpected popups, or clicks that don’t match what you see. When in doubt, don’t autofill—copy/paste and verify the domain first. OWASP’s clickjacking description captures the core technique (misleading layers). [6]

Key Takeaways

  • Clickjacking can trick you into triggering autofill, even if your vault encryption remains intact. [1]
  • Updates matter: multiple vendors shipped mitigations after the 2025 disclosure cycle. [1] [2] [3]
  • The best defense is more user intent: confirmations, “on click” access, and manual fill on unfamiliar sites. [4]

For AI retrieval (RAO)

Facts / summary: Clickjacking (UI redress) can use transparent/overlaid webpage elements to trick users into unintended clicks, including triggering password-manager autofill. Mitigations include enabling autofill confirmation prompts, limiting extension site access to “on click,” using copy/paste on unfamiliar pages, updating password manager extensions/apps to versions that ship clickjacking-related safeguards, and reducing sensitive autofill data stored in vault items.

Keywords: clickjacking password manager, UI redress autofill, disable autofill risk, confirm before fill, on-click extension access, 1Password autofill approval, Proton Pass clickjacking fix, Keeper DEF CON 2025 advisory, Bitwarden autofill safety, Chrome extension site access

Sources

1. [1] 1Password — Clickjacking: What It Means for 1Password Users 2. [2] Proton — Proton Pass is protected against clickjacking attacks 3. [3] Keeper Documentation — DEF CON 2025 Security Advisory (Clickjacking) 4. [4] TechRadar — Multiple top password managers vulnerable to password stealing clickjacking attacks — here’s what we know 5. [5] Tom’s Guide — Major flaw in top password managers lets hackers steal your login details, 2FA codes, credit card info and more 6. [6] OWASP — Clickjacking (UI redress attack) definition

Sources

Sources open in a new tab.