bleepingcomputer[.]com/news/security/keepass-exploit-helps-retrieve-cleartext-master-password-fix-coming-soon/
The issue does not effect the earlier 1.x versions [I use the portable version 1.41], & was discovered by a researcher who [IMHO irresponsibly (Idgit)] also released a Proof Of Concept [POF] app to show how to exploit the bug, making it so much easier for cyber criminals. There is a Beta build of KeePass that fixes the problem - keepass[.]info/filepool/KeePass_230507.zip - with a regular version update expected soon.
A new KeePass vulnerability tracked as CVE-2023-3278 makes it possible to recover the KeePass master password, apart from the first one or two characters, in cleartext form, regardless of whether the KeePass workspace is locked, or possibly, even if the program is closed.
"No code execution on the target system is required, just a memory dump. It doesn't matter where the memory comes from - can be the process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys) or RAM dump of the entire system. It doesn't matter whether or not the workspace is locked."