Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-25001: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Microsoft Microsoft Edge for iOS

0
Medium
VulnerabilityCVE-2025-25001cvecve-2025-25001cwe-79
Published: Fri Apr 04 2025 (04/04/2025, 00:00:13 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Microsoft Edge for iOS

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 09:04:46 UTC

Technical Analysis

CVE-2025-25001 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting Microsoft Edge for iOS version 1.0.0.0. This vulnerability stems from improper neutralization of input during web page generation, which allows an attacker to inject malicious scripts into web pages viewed by users. The flaw enables an unauthorized attacker to perform spoofing attacks over a network, potentially deceiving users by displaying fraudulent content or capturing sensitive information such as cookies or session tokens. The vulnerability has a CVSS 3.1 base score of 4.3, indicating medium severity, with an attack vector of network (remote), low attack complexity, no privileges required, but requiring user interaction (e.g., clicking a crafted link). The scope is unchanged, meaning the vulnerability affects only the vulnerable component without impacting other components. The impact is limited to confidentiality, with no direct effect on integrity or availability. No known exploits have been reported in the wild, and no patches are currently available. The vulnerability was reserved on January 30, 2025, and published on April 4, 2025. Given the nature of XSS, exploitation could lead to phishing, session hijacking, or information disclosure, particularly in environments where Microsoft Edge on iOS is used for accessing sensitive web applications.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, as attackers could use spoofed web content to trick users into divulging sensitive information or credentials. Organizations with employees using Microsoft Edge on iOS devices for business purposes, especially in sectors like finance, healthcare, and government, could face targeted phishing or social engineering attacks leveraging this flaw. The impact is somewhat mitigated by the requirement for user interaction and the absence of known active exploits. However, given the widespread use of iOS devices and Microsoft Edge in Europe, the potential for exploitation exists, particularly in mobile-first or remote work environments. The vulnerability could undermine trust in web applications accessed via Edge on iOS and lead to data leakage or unauthorized access if exploited successfully.

Mitigation Recommendations

1. Advise users to exercise caution when clicking on links received via email, messaging apps, or untrusted sources, especially on Microsoft Edge for iOS. 2. Temporarily disable or restrict JavaScript execution in Edge for iOS where feasible, to reduce the risk of script-based attacks. 3. Implement robust web application security controls such as Content Security Policy (CSP) headers to limit the impact of XSS attacks. 4. Monitor network traffic and user reports for signs of phishing or spoofing attempts targeting Edge on iOS devices. 5. Encourage users to update Microsoft Edge for iOS promptly once Microsoft releases a patch addressing this vulnerability. 6. Employ endpoint protection solutions capable of detecting malicious web content or anomalous browser behavior on iOS devices. 7. Conduct user awareness training focused on recognizing spoofed web pages and social engineering tactics. 8. For organizations with mobile device management (MDM), consider restricting the use of vulnerable browser versions or enforcing browser usage policies until patched.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-01-30T15:14:20.993Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb11

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/14/2026, 9:04:46 AM

Last updated: 3/25/2026, 4:51:04 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses