Skip to main content

CVE-2025-41408: Improper authorization in handler for custom URL scheme in LY Corporation "Yahoo! Shopping" App for Android

Medium
VulnerabilityCVE-2025-41408cvecve-2025-41408
Published: Fri Sep 05 2025 (09/05/2025, 05:25:15 UTC)
Source: CVE Database V5
Vendor/Project: LY Corporation
Product: "Yahoo! Shopping" App for Android

Description

Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthenticated attacker may lead a user to access an arbitrary website on the vulnerable App. As a result, the user may become a victim of a phishing attack.

AI-Powered Analysis

AILast updated: 09/05/2025, 13:55:41 UTC

Technical Analysis

CVE-2025-41408 is a medium-severity vulnerability affecting the "Yahoo! Shopping" Android application developed by LY Corporation, specifically versions prior to 14.15.0. The vulnerability arises from improper authorization in the handler for a custom URL scheme within the app. Custom URL schemes are often used by mobile applications to enable deep linking or inter-app communication. In this case, the handler does not properly verify or restrict the URLs it processes, allowing a remote unauthenticated attacker to craft malicious links that, when clicked by a user, cause the app to open arbitrary websites. This behavior can be exploited to conduct phishing attacks by directing users to fraudulent websites that mimic legitimate services, potentially leading to credential theft or other social engineering outcomes. The vulnerability requires user interaction (clicking a malicious link) but no prior authentication or elevated privileges. The CVSS v3.0 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction, and impacting integrity only (no confidentiality or availability impact). No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on September 5, 2025, with no official patch links provided in the data, indicating that users should upgrade to version 14.15.0 or later once available to remediate the issue.

Potential Impact

For European organizations, the primary risk posed by this vulnerability is the facilitation of phishing attacks targeting employees or customers using the Yahoo! Shopping Android app. While the vulnerability does not directly compromise device confidentiality or availability, successful exploitation can lead to credential theft, unauthorized access to corporate accounts, or fraud if users are tricked into entering sensitive information on attacker-controlled websites. Retailers, e-commerce platforms, and financial institutions in Europe may face indirect impacts if their customers are targeted via this vector, potentially damaging brand reputation and customer trust. Additionally, organizations with BYOD (Bring Your Own Device) policies or that rely on mobile commerce apps should be aware of the increased phishing risk. The vulnerability’s exploitation requires user interaction, which somewhat limits its impact scope, but the widespread use of the Yahoo! Shopping app in certain European markets could increase exposure. Since the vulnerability affects only Android devices, organizations with a significant Android user base are more at risk. The lack of known exploits in the wild reduces immediate threat urgency but does not eliminate the risk of future exploitation.

Mitigation Recommendations

1. Immediate mitigation involves educating users about the risks of clicking unsolicited or suspicious links, especially those purporting to open the Yahoo! Shopping app or related services. 2. Organizations should enforce mobile device management (MDM) policies that restrict installation of outdated app versions and encourage timely updates. 3. Monitor for phishing campaigns targeting users of the Yahoo! Shopping app and implement email and web filtering solutions to block malicious URLs. 4. Encourage users to update the Yahoo! Shopping app to version 14.15.0 or later as soon as the patch is available to ensure the vulnerability is remediated. 5. Developers and security teams should audit custom URL scheme handlers in mobile apps to ensure proper authorization and validation of input URLs to prevent similar vulnerabilities. 6. Implement multi-factor authentication (MFA) on critical services to reduce the impact of credential theft resulting from phishing. 7. Consider deploying endpoint protection solutions capable of detecting phishing attempts and malicious URL redirections on mobile devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-08-29T01:43:32.740Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68baeaa857c5b37b67a4621f

Added to database: 9/5/2025, 1:50:32 PM

Last enriched: 9/5/2025, 1:55:41 PM

Last updated: 9/5/2025, 1:55:41 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats