Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14021: na in LINE Corporation LINE client for iOS

0
Medium
VulnerabilityCVE-2025-14021cvecve-2025-14021
Published: Mon Dec 15 2025 (12/15/2025, 06:41:37 UTC)
Source: CVE Database V5
Vendor/Project: LINE Corporation
Product: LINE client for iOS

Description

The in-app browser in LINE client for iOS versions prior to 14.14 is vulnerable to address bar spoofing, which could allow attackers to execute malicious JavaScript within iframes while displaying trusted URLs, enabling phishing attacks through overlaid malicious content.

AI-Powered Analysis

AILast updated: 12/22/2025, 07:21:45 UTC

Technical Analysis

CVE-2025-14021 is a vulnerability in the in-app browser component of the LINE client for iOS, specifically affecting versions prior to 14.14, including version 14.13. The vulnerability allows an attacker to perform address bar spoofing by injecting malicious JavaScript into iframes rendered within the in-app browser. This malicious script can manipulate the displayed URL in the address bar, making it appear as a trusted or legitimate site while actually showing attacker-controlled content. This spoofing enables phishing attacks by overlaying malicious content that deceives users into divulging sensitive information such as credentials or personal data. The vulnerability is categorized under CWE-451, which relates to address bar spoofing issues that undermine user trust in the authenticity of the displayed URL. The attack vector is remote network-based (AV:N), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), with no direct impact on confidentiality (C:N), but a low impact on integrity (I:L) and no impact on availability (A:N). No patches or exploits are currently publicly available, but the vendor has released version 14.14 to address the issue. The vulnerability is significant because LINE is widely used for personal and business communication, and the in-app browser is a common attack surface for phishing and social engineering. By exploiting this flaw, attackers can bypass URL verification mechanisms that users rely on to confirm site legitimacy, increasing the risk of successful phishing campaigns.

Potential Impact

For European organizations, the impact of CVE-2025-14021 lies primarily in the potential for phishing attacks that could lead to credential theft, unauthorized access, and subsequent compromise of corporate accounts or sensitive information. Since LINE is popular in several European countries for both personal and professional communication, employees using vulnerable versions of the iOS client may be targeted by attackers leveraging this spoofing vulnerability. This could facilitate spear-phishing campaigns that bypass traditional email filters by exploiting trusted communication channels. The integrity of user interactions is compromised, potentially leading to financial fraud, data breaches, or lateral movement within corporate networks if attackers gain access to internal systems. Although the vulnerability does not directly affect confidentiality or availability, the indirect consequences of successful phishing can be severe. Organizations with BYOD policies or those that rely on LINE for customer engagement should be particularly vigilant. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often weaponize such vulnerabilities once publicly disclosed.

Mitigation Recommendations

The primary mitigation is to update the LINE client for iOS to version 14.14 or later, where the vulnerability has been addressed. Organizations should enforce mobile device management (MDM) policies that mandate timely application updates for corporate and BYOD devices. User education is critical: train employees to recognize phishing attempts, especially those originating from in-app browsers, and to verify URLs through external browsers when in doubt. Implement network-level protections such as DNS filtering and web proxies that can detect and block known phishing domains. Consider disabling or restricting the use of in-app browsers within LINE if feasible, or use security solutions that monitor app behavior for suspicious activity. Regularly audit and monitor for unusual login patterns or access attempts that could indicate credential compromise stemming from phishing. Finally, maintain an incident response plan that includes steps for addressing phishing incidents originating from mobile applications.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
LY-Corporation
Date Reserved
2025-12-04T11:44:56.068Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693fb1fed9bcdf3f3dbd0782

Added to database: 12/15/2025, 7:00:14 AM

Last enriched: 12/22/2025, 7:21:45 AM

Last updated: 2/2/2026, 8:04:06 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats