FKIE_CVE-2025-3839
Vulnerability from fkie_nvd - Published: 2026-01-23 05:16 - Updated: 2026-04-15 00:35
Severity ?
Summary
A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en Epiphany, una herramienta que permite a los sitios web abrir aplicaciones de manejadores de URL externos con m\u00ednima interacci\u00f3n del usuario. Este dise\u00f1o puede ser mal utilizado para explotar vulnerabilidades dentro de esos manejadores, haci\u00e9ndolos parecer remotamente explotables. El navegador no logra advertir o restringir adecuadamente esta acci\u00f3n, lo que resulta en una posible ejecuci\u00f3n de c\u00f3digo en el dispositivo del cliente a trav\u00e9s de un comportamiento de interfaz de usuario de confianza."
}
],
"id": "CVE-2025-3839",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.8,
"source": "patrick@puiterwijk.org",
"type": "Secondary"
}
]
},
"published": "2026-01-23T05:16:21.753",
"references": [
{
"source": "patrick@puiterwijk.org",
"url": "https://access.redhat.com/security/cve/CVE-2025-3839"
},
{
"source": "patrick@puiterwijk.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2361430"
}
],
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-356"
}
],
"source": "patrick@puiterwijk.org",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…