icon

We found results for “

CVE-2025-25300

Good to know:

icon
icon

Date: February 18, 2025

smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner "View" link and navigating to 3rd party page leaves "window.opener" exposed. It may allow hostile third parties to abuse "window.opener", e.g. by redirection or injection on the original page with smartbanner. "rel="noopener"" is automatically populated to links as of "v1.14.1" which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure "View" link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If "View" link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, "rel="noopener"" is imposed on all "target="_blank"" links. Version 1.14.1 of smartbanner.js contains a fix for the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

CWE-79

URL Redirection to Untrusted Site ('Open Redirect')

CWE-601

Top Fix

icon

Upgrade Version

Upgrade to version smartbanner.js - 1.14.1;smartbanner.js - 1.14.1

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): CHANGED
Confidentiality (C): NONE
Integrity (I): LOW
Availability (A): NONE

Do you need more information?

Contact Us