Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14020: na in LINE Corporation LINE client for Android

0
Medium
VulnerabilityCVE-2025-14020cvecve-2025-14020
Published: Mon Dec 15 2025 (12/15/2025, 06:39:51 UTC)
Source: CVE Database V5
Vendor/Project: LINE Corporation
Product: LINE client for Android

Description

CVE-2025-14020 is a medium severity UI spoofing vulnerability in the LINE client for Android versions prior to 14. 20. The flaw exists in the in-app browser where the full-screen security Toast notification fails to re-display properly when users switch back from other applications. This can allow attackers to impersonate legitimate interfaces and conduct phishing attacks by tricking users into interacting with malicious content disguised as trusted UI elements. The vulnerability requires user interaction but no authentication and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the issue poses a risk to confidentiality and integrity of user data. European organizations using LINE for Android should prioritize updating to version 14. 20 or later to mitigate this risk. Countries with high LINE user penetration and significant mobile communication usage are more likely to be affected. Practical mitigations include educating users about phishing risks, restricting in-app browser usage for sensitive transactions, and monitoring for suspicious link activity within the app.

AI-Powered Analysis

AILast updated: 12/15/2025, 07:16:03 UTC

Technical Analysis

CVE-2025-14020 is a user interface (UI) spoofing vulnerability identified in the LINE client for Android versions prior to 14.20. The vulnerability resides in the in-app browser component of the LINE application, specifically in how it handles the display of the full-screen security Toast notification. Normally, this notification serves as a visual security indicator to inform users that they are interacting with a secure or trusted interface. However, when users switch away from the LINE app to another application and then return, the security Toast notification fails to re-display properly. This UI inconsistency can be exploited by attackers to present a spoofed interface that mimics legitimate LINE UI elements or trusted web content within the in-app browser. By leveraging this flaw, attackers can craft phishing attacks that deceive users into divulging sensitive information such as credentials or personal data. The vulnerability has a CVSS v3.1 base score of 5.4, indicating medium severity. It requires no privileges (PR:N) and can be exploited remotely over the network (AV:N), but it does require user interaction (UI:R). The impact primarily affects confidentiality and integrity, with no direct impact on availability. No known exploits have been reported in the wild as of the published date. The vulnerability was publicly disclosed on December 15, 2025, and affects LINE client versions prior to 14.20, including version 10.0. No official patches or mitigation links were provided in the source data, but upgrading to the fixed version is implied.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user data accessed through the LINE Android client. Since LINE is widely used for personal and business communication, phishing attacks exploiting this UI spoofing flaw could lead to credential theft, unauthorized access to sensitive conversations, and potential lateral movement within corporate networks if LINE accounts are linked to enterprise resources. The in-app browser is often used to open links without leaving the app, increasing the risk that users may be tricked by spoofed interfaces. Although the vulnerability does not affect availability, the reputational damage and potential data breaches resulting from successful phishing could be significant. Organizations relying on LINE for communication or customer engagement should be aware of this risk, especially in sectors with high regulatory requirements for data protection such as finance, healthcare, and government. The medium severity rating suggests a moderate but actionable threat that should be addressed promptly to prevent exploitation.

Mitigation Recommendations

1. Upgrade the LINE client for Android to version 14.20 or later as soon as it becomes available, as this version addresses the UI spoofing vulnerability. 2. Educate users about the risks of phishing attacks, emphasizing caution when interacting with links or prompts within the LINE in-app browser, especially after switching between apps. 3. Limit or disable the use of the in-app browser for sensitive transactions or communications where possible, encouraging users to open links in trusted external browsers that have stronger security controls. 4. Implement mobile device management (MDM) policies to enforce app updates and restrict installation of outdated or vulnerable app versions. 5. Monitor network traffic and user reports for suspicious activity related to phishing attempts via LINE messages or links. 6. Encourage multi-factor authentication (MFA) on LINE accounts and any linked services to reduce the impact of credential compromise. 7. Collaborate with LINE Corporation for timely patch releases and security advisories to stay informed about further developments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
LY-Corporation
Date Reserved
2025-12-04T11:44:51.875Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693fb1fed9bcdf3f3dbd077f

Added to database: 12/15/2025, 7:00:14 AM

Last enriched: 12/15/2025, 7:16:03 AM

Last updated: 12/15/2025, 9:38:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats