Skip to main content

CVE-2021-25254: CWE-116 Improper Encoding or Escaping of Output in Yandex Browser Lite

High
VulnerabilityCVE-2021-25254cvecve-2021-25254cwe-116
Published: Wed May 21 2025 (05/21/2025, 06:58:00 UTC)
Source: CVE
Vendor/Project: Yandex
Product: Browser Lite

Description

Yandex Browser Lite for Android before 21.1.0 allows remote attackers to spoof the address bar.

AI-Powered Analysis

AILast updated: 07/06/2025, 04:55:45 UTC

Technical Analysis

CVE-2021-25254 is a high-severity vulnerability identified in Yandex Browser Lite for Android versions prior to 21.1.0. The underlying issue is classified under CWE-116, which pertains to improper encoding or escaping of output. Specifically, this vulnerability allows remote attackers to spoof the address bar within the browser. Spoofing the address bar means an attacker can manipulate the displayed URL, potentially misleading users into believing they are visiting a legitimate website when they are not. This can facilitate phishing attacks, credential theft, or distribution of malware by exploiting user trust in the browser's URL display. The vulnerability does not require any privileges or authentication and can be triggered remotely without user interaction, although user interaction (such as visiting a malicious link) is necessary to exploit the spoofing. The CVSS 4.0 score of 8.2 reflects a high severity, with attack vector being network-based, low attack complexity, no privileges required, and no user authentication needed. The vulnerability impacts confidentiality primarily by enabling phishing and social engineering attacks that can lead to credential compromise. Integrity and availability impacts are minimal or not directly affected. No known exploits are reported in the wild, and no official patches are linked, but the vulnerability is publicly disclosed and should be addressed promptly by updating to version 21.1.0 or later.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in the context of phishing and social engineering attacks. Since Yandex Browser Lite is a popular lightweight browser, especially among users in Russia and some Eastern European countries, organizations with employees or customers using this browser could face increased risk of credential theft or fraud. Attackers exploiting this vulnerability could impersonate trusted websites, leading to unauthorized access to corporate accounts, data breaches, or financial fraud. The impact is heightened in sectors with high reliance on web-based services, such as finance, government, and critical infrastructure. Additionally, the ability to spoof the address bar undermines user trust in browser security indicators, potentially increasing the success rate of targeted attacks. While the vulnerability does not directly compromise system integrity or availability, the indirect consequences of successful phishing campaigns can be severe, including data loss, regulatory penalties under GDPR, and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Ensure all users of Yandex Browser Lite update to version 21.1.0 or later, where the vulnerability is fixed. 2) Implement enterprise-wide browser usage policies that restrict or monitor the use of less common browsers like Yandex Browser Lite, especially on corporate devices. 3) Educate users about the risks of address bar spoofing and encourage verification of URLs through alternative means (e.g., bookmarks, direct navigation). 4) Deploy advanced email and web filtering solutions to detect and block phishing attempts that might exploit this vulnerability. 5) Use multi-factor authentication (MFA) on all critical services to reduce the impact of credential theft. 6) Monitor network traffic and user behavior for signs of phishing or account compromise related to spoofed URLs. 7) Engage with Yandex or trusted security advisories to obtain official patches or updates as soon as they become available, given the absence of direct patch links in the current disclosure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
yandex
Date Reserved
2021-01-15T16:29:27.867Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d7b32c631aa761259c0de

Added to database: 5/21/2025, 7:05:22 AM

Last enriched: 7/6/2025, 4:55:45 AM

Last updated: 7/30/2025, 6:59:22 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats