Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14023: na in LINE Corporation LINE client for iOS

0
Low
VulnerabilityCVE-2025-14023cvecve-2025-14023
Published: Mon Dec 15 2025 (12/15/2025, 06:45:23 UTC)
Source: CVE Database V5
Vendor/Project: LINE Corporation
Product: LINE client for iOS

Description

LINE client for iOS prior to 15.19 allows UI spoofing due to inconsistencies between the navigation state and the in-app browser's user interface, which could create confusion about the trust context of displayed pages or interactive elements under specific conditions.

AI-Powered Analysis

AILast updated: 01/07/2026, 19:47:00 UTC

Technical Analysis

CVE-2025-14023 is a vulnerability identified in the LINE client for iOS, specifically affecting versions prior to 15.19. The issue stems from a UI spoofing flaw caused by inconsistencies between the navigation state and the in-app browser's user interface. This discrepancy can cause confusion about the trust context of displayed pages or interactive elements, potentially tricking users into believing they are interacting with legitimate content when they are not. The vulnerability is categorized under CWE-451, which relates to improper UI consistency leading to spoofing attacks. Exploitation requires no privileges but does require user interaction, and the attack complexity is high, meaning an attacker must carefully craft conditions to exploit this flaw. The CVSS score is 3.1, reflecting a low severity primarily due to the lack of confidentiality or availability impact and the need for user interaction. No patches are linked yet, and no known exploits have been reported in the wild. The vulnerability could be leveraged in phishing or social engineering attacks within the LINE app, potentially leading users to disclose sensitive information or perform unintended actions under false trust assumptions.

Potential Impact

For European organizations, the impact of CVE-2025-14023 is primarily related to user trust and potential social engineering risks rather than direct system compromise. Since the vulnerability allows UI spoofing, attackers could deceive users into interacting with malicious content disguised as legitimate within the LINE app, potentially leading to credential theft or unauthorized actions. However, the low CVSS score and high attack complexity reduce the likelihood of widespread exploitation. Organizations relying on LINE for internal or external communications might face increased phishing risks, especially if users are not trained to recognize suspicious UI behavior. The impact on confidentiality and availability is minimal, but integrity could be indirectly affected if users are misled into performing harmful actions. This threat is more relevant for sectors with high communication dependency on LINE, such as customer service, sales, or collaboration teams.

Mitigation Recommendations

To mitigate CVE-2025-14023, European organizations should prioritize updating the LINE client for iOS to version 15.19 or later once available, as this will address the UI spoofing inconsistencies. Until patches are applied, organizations should implement targeted user awareness training focusing on recognizing suspicious UI elements and avoiding interaction with unexpected links or prompts within the LINE app. Deploy mobile device management (MDM) solutions to enforce app updates and restrict installation of outdated versions. Additionally, monitoring for unusual user behavior or reports of suspicious messages within LINE can help detect potential exploitation attempts. Organizations should also consider restricting sensitive communications over LINE until the vulnerability is patched, especially in high-risk environments. Finally, encouraging multi-factor authentication (MFA) for accounts accessed via LINE can reduce the impact of potential credential theft resulting from UI spoofing attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
LY-Corporation
Date Reserved
2025-12-04T11:45:06.869Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693fb1fed9bcdf3f3dbd0788

Added to database: 12/15/2025, 7:00:14 AM

Last enriched: 1/7/2026, 7:47:00 PM

Last updated: 2/6/2026, 11:07:06 AM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats