We found results for “”
CVE-2025-3839
Good to know:
Date: January 22, 2026
A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior.
Severity Score
Severity Score
Weakness Type (CWE)
Product UI does not Warn User of Unsafe Actions
CWE-356Top Fix
Upgrade Version
Upgrade to version https://gitlab.gnome.org/GNOME/epiphany.git - 47.5;https://gitlab.gnome.org/GNOME/epiphany.git - 48.1
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


