- What's Actually in Your Browser After Logging In
- The Right Order: Change Password First, Then Clear Cache
- When This Actually Matters (and When It Doesn't)
- Does Cache Store Passwords?
- What About "Remember Me" Cookies?
- JWT Tokens and Single-Page Applications
- Clearing Cache on the Right Scope
- Step-by-Step: Clearing a Specific Site After Password Change
- After the Password Change: Full Security Checklist
- Frequently Asked Questions
- What's Actually in Your Browser After Logging In
- The Right Order: Change Password First, Then Clear Cache
- When This Actually Matters (and When It Doesn't)
- Does Cache Store Passwords?
- What About "Remember Me" Cookies?
- JWT Tokens and Single-Page Applications
- Clearing Cache on the Right Scope
- Step-by-Step: Clearing a Specific Site After Password Change
- After the Password Change: Full Security Checklist
- Frequently Asked Questions
Changing your password is the right move after a suspected breach, account compromise, or as part of regular security hygiene. But stopping there leaves something behind: session cookies stored in your browser that can keep the old access alive — sometimes for weeks. This guide explains what to clear, in what order, and why it matters for accounts that actually contain sensitive information.
Clear Cache for a Specific Site After Password Change
Clear Cache lets you wipe cookies, cache, and session data for just the site you changed your password on — without logging out of Google, Gmail, or anything else.
Add to Chrome — FreeWhat's Actually in Your Browser After Logging In
When you sign in to a website, the site doesn't keep your password in the browser. Instead, it creates a session and stores a session token — a random string that proves you're authenticated — in a cookie. That cookie is sent automatically with every request to that site, keeping you logged in.
Here's a breakdown of what different storage types hold:
| Storage Type | What It Stores | Security Relevance After Password Change |
|---|---|---|
| Cookies | Session tokens, authentication tokens, "remember me" tokens | High — old session tokens can maintain access |
| localStorage / sessionStorage | User preferences, JWT tokens on some apps, UI state | Medium — some apps store JWT access tokens here |
| HTTP Cache | HTML, CSS, JS files, images | Low — doesn't contain credentials |
| Saved Passwords | Your actual username/password | Medium — needs to be updated to new password |
| IndexedDB | App-specific data, sometimes user data | Low to medium, depends on the app |
| Service Worker Cache | App assets for offline use | Low — doesn't contain credentials |
The biggest concern is cookies and, for certain apps, localStorage/sessionStorage. These are what maintain active sessions after a password change.
The Right Order: Change Password First, Then Clear Cache
The sequence matters. Clearing cache before changing your password doesn't accomplish anything security-wise — you'll just generate fresh session data when you log in to change the password. The correct order:
chrome://password-manager/passwords, find the site, and manually update the stored password to the new one.
When This Actually Matters (and When It Doesn't)
Not every password change warrants a full cache and cookie clear. Here's a realistic risk assessment:
| Situation | Should You Clear Cache/Cookies? | Why |
|---|---|---|
| Routine password rotation on personal device | Optional | Low risk on a device only you use |
| Account compromise suspected | Yes — essential | Invalidate all old session tokens immediately |
| Logged in on shared/work computer | Yes — essential | Session tokens on that machine need to be cleared |
| Logged in on a friend's computer temporarily | Yes — clear their browser cache/cookies | Your session is still stored on their machine |
| Password manager breach | Yes — along with changing all affected passwords | Change credentials everywhere, then clear sessions |
| Changed password for unrelated upgrade (e.g., made it stronger) | Optional | The new session you have is fine |
| Phishing — you entered credentials on a fake site | Yes — on the real site immediately | Change password on the real site and clear old sessions |
Does Cache Store Passwords?
The HTTP cache does not store your actual password. When you type your password into a login form and submit it, the password travels over HTTPS to the server. The browser cache stores page content (HTML, CSS, JavaScript, images) — not form submissions or authentication credentials.
Where passwords do live in your browser:
- Chrome Password Manager (
chrome://password-manager) — if you chose to save the password when Chrome prompted - Third-party password managers (1Password, Bitwarden, etc.) — in their own encrypted storage
- Autofill data — Chrome's form autofill, separate from Password Manager
None of these are cleared by standard cache clearing. They require explicit management through the password manager settings. After changing a password, update the entry in whichever password manager you use.
What About "Remember Me" Cookies?
Many sites offer a "Remember me for 30 days" or "Stay signed in" option. These create long-lived authentication cookies — typically separate from regular session cookies and designed to persist even after closing the browser.
These "remember me" cookies are often implemented with a longer expiry (30 days, 90 days, or even a year) and may not be invalidated when you change your password — depending on how the site is built. Well-implemented sites invalidate all remember-me tokens when a password change occurs. Poorly implemented ones don't.
JWT Tokens and Single-Page Applications
Modern web applications — particularly React, Vue, or Angular apps — sometimes store authentication tokens in localStorage or sessionStorage rather than in cookies. These are called JWT (JSON Web Token) access tokens.
If you change your password on an app that uses JWT tokens stored in localStorage:
- The old access token might still be valid until it expires (often 15 minutes to 1 hour for access tokens)
- The refresh token (stored in a cookie or localStorage) might remain valid longer
- Clearing localStorage for that site removes the stored tokens immediately
When you use Clear Cache and select "All site data," it clears localStorage and sessionStorage along with cookies and cache — handling this scenario completely.
Clearing Cache on the Right Scope
There are two approaches to clearing cache after a password change, each with trade-offs:
Option A: Clear All Data for the Specific Site Only (Recommended)
Use Clear Cache extension while on the affected site to clear only that site's data. You remain logged in everywhere else. This is the right approach for a targeted post-password-change cleanup — you don't need to log back in to Gmail just because you changed your banking password.
Option B: Clear All Cookies and Cache in Chrome
Use Ctrl+Shift+Delete → select cookies and cached files → clear. This logs you out of every single site. Use this approach when you suspect broad compromise across multiple accounts, or after using someone else's computer before returning it.
Step-by-Step: Clearing a Specific Site After Password Change
chrome://settings/content/all. Search for the site's domain. Click the entry, then click "Clear data." This removes everything stored by that site — cookies, cache, IndexedDB, localStorage. You'll be signed out of that site on this browser.
After the Password Change: Full Security Checklist
Cache and cookie clearing is one piece of a thorough post-compromise response. Here's the complete checklist for accounts where security matters:
- Change the password — Use a unique, strong password (15+ characters, password manager generated)
- Enable two-factor authentication — Authenticator app (not SMS if possible) provides the strongest protection
- Sign out of all sessions — Account settings → Security → Active sessions → revoke all
- Review connected apps — Account settings → Connected apps/Third-party access → revoke anything unrecognized
- Clear browser cache and cookies for the affected site
- Update saved password in password manager or Chrome's built-in password manager
- Check other accounts for reuse — If you used the same password elsewhere, change those too
- Check email for breach notifications — haveibeenpwned.com shows if your email appeared in known data breaches
Clean Up After a Password Change in One Click
Clear Cache removes cookies, session tokens, and cached data for any specific site — without touching your other accounts. Perfect for targeted post-password-change cleanup.
Add to Chrome — FreeFrequently Asked Questions
Should I clear cache before or after changing my password?
Clear cache and cookies after changing your password, not before. The correct sequence is: change password → sign out of all active sessions → clear cache and cookies for that site → sign back in with the new password. Clearing before changes nothing — you just regenerate cached data and session tokens when you log in to make the change.
Does clearing cache log you out of all sites?
It depends on what you clear. Clearing only the HTTP cache (images, scripts, stylesheets) doesn't log you out of anything. Clearing cookies logs you out of every site whose cookies you clear. With Clear Cache extension, you can target a specific site's cookies — clearing that one site's session without logging out of Gmail, your bank, or anywhere else.
What does browser cache have to do with password security?
Browser cache itself doesn't store passwords. The security concern is cookies — specifically session cookies and "remember me" authentication tokens stored alongside cached data. These tokens can maintain login access even after you change your password, if the site doesn't automatically invalidate old sessions. Clearing cookies removes these tokens from your browser, forcing a fresh sign-in with the new password.
My browser remembers my old password — how do I update it?
Chrome usually prompts you to update the saved password when you sign in with the new credentials. If it doesn't prompt: go to chrome://password-manager/passwords, find the site, click the three-dot menu, and select Edit. Update the password to the new one. For third-party password managers (1Password, Bitwarden), edit the entry within the manager's interface. Clearing cache does not update saved passwords — those are stored separately.
Does clearing cache remove saved passwords?
No. Chrome's Password Manager is completely separate from browser cache. Clearing cache, cookies, browsing history, or any combination of these does not delete saved passwords. To remove a saved password, go to chrome://password-manager/passwords and delete the entry manually. Saved passwords are also backed up to your Google account if Chrome sync is enabled.
Is clearing cache enough, or do I need to do more after a password change?
Clearing cache and cookies is the local browser cleanup step — it removes session tokens from your current device. But the most important security action is signing out of all active sessions through the account's security settings, which invalidates sessions on all devices simultaneously. Cache clearing alone only affects your current browser. If you're responding to a suspected breach, also enable two-factor authentication, review connected apps, and check for password reuse across other accounts.
What if I changed my password on a shared computer? What should I do?
If you accessed an account on a shared computer (library, hotel, work computer), clear all cookies and cached data in that browser before leaving. If you can't do this (e.g., you left without clearing), sign in to the account from your own device, go to Security settings, and revoke all active sessions — this kills any session token that may still be active on the shared computer, regardless of whether it was cleared locally.