Upstream information

CVE-2025-3839 at MITRE

Description

A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having important severity.

CVSS v3 Scores
CVSS detail CNA (Fedora Project) SUSE
Base Score 8 8
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Attack Vector Network Network
Attack Complexity High High
Privileges Required None None
User Interaction Required Required
Scope Changed Changed
Confidentiality Impact High High
Integrity Impact High High
Availability Impact None None
CVSSv3 Version 3.1 3.1
SUSE Bugzilla entry: 1241524 [NEW]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
openSUSE Tumbleweed
  • epiphany >= 48.1-1.1
  • epiphany-branding-upstream >= 48.1-1.1
  • epiphany-lang >= 48.1-1.1
  • gnome-shell-search-provider-epiphany >= 48.1-1.1
Patchnames:
openSUSE-Tumbleweed-2025-15011


SUSE Timeline for this CVE

CVE page created: Mon Apr 21 12:00:02 2025
CVE page last modified: Fri Jan 23 13:06:24 2026