CVE-2025-41408: Improper authorization in handler for custom URL scheme in LY Corporation "Yahoo! Shopping" App for Android
Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthenticated attacker may lead a user to access an arbitrary website on the vulnerable App. As a result, the user may become a victim of a phishing attack.
AI Analysis
Technical Summary
CVE-2025-41408 is a medium-severity vulnerability affecting the "Yahoo! Shopping" Android application developed by LY Corporation, specifically versions prior to 14.15.0. The vulnerability arises from improper authorization in the handler for a custom URL scheme within the app. Custom URL schemes are often used by mobile applications to enable deep linking or inter-app communication. In this case, the handler does not properly verify or restrict the URLs it processes, allowing a remote unauthenticated attacker to craft malicious links that, when clicked by a user, cause the app to open arbitrary websites. This behavior can be exploited to conduct phishing attacks by directing users to fraudulent websites that mimic legitimate services, potentially leading to credential theft or other social engineering outcomes. The vulnerability requires user interaction (clicking a malicious link) but no prior authentication or elevated privileges. The CVSS v3.0 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction, and impacting integrity only (no confidentiality or availability impact). No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on September 5, 2025, with no official patch links provided in the data, indicating that users should upgrade to version 14.15.0 or later once available to remediate the issue.
Potential Impact
For European organizations, the primary risk posed by this vulnerability is the facilitation of phishing attacks targeting employees or customers using the Yahoo! Shopping Android app. While the vulnerability does not directly compromise device confidentiality or availability, successful exploitation can lead to credential theft, unauthorized access to corporate accounts, or fraud if users are tricked into entering sensitive information on attacker-controlled websites. Retailers, e-commerce platforms, and financial institutions in Europe may face indirect impacts if their customers are targeted via this vector, potentially damaging brand reputation and customer trust. Additionally, organizations with BYOD (Bring Your Own Device) policies or that rely on mobile commerce apps should be aware of the increased phishing risk. The vulnerability’s exploitation requires user interaction, which somewhat limits its impact scope, but the widespread use of the Yahoo! Shopping app in certain European markets could increase exposure. Since the vulnerability affects only Android devices, organizations with a significant Android user base are more at risk. The lack of known exploits in the wild reduces immediate threat urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
1. Immediate mitigation involves educating users about the risks of clicking unsolicited or suspicious links, especially those purporting to open the Yahoo! Shopping app or related services. 2. Organizations should enforce mobile device management (MDM) policies that restrict installation of outdated app versions and encourage timely updates. 3. Monitor for phishing campaigns targeting users of the Yahoo! Shopping app and implement email and web filtering solutions to block malicious URLs. 4. Encourage users to update the Yahoo! Shopping app to version 14.15.0 or later as soon as the patch is available to ensure the vulnerability is remediated. 5. Developers and security teams should audit custom URL scheme handlers in mobile apps to ensure proper authorization and validation of input URLs to prevent similar vulnerabilities. 6. Implement multi-factor authentication (MFA) on critical services to reduce the impact of credential theft resulting from phishing. 7. Consider deploying endpoint protection solutions capable of detecting phishing attempts and malicious URL redirections on mobile devices.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden
CVE-2025-41408: Improper authorization in handler for custom URL scheme in LY Corporation "Yahoo! Shopping" App for Android
Description
Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthenticated attacker may lead a user to access an arbitrary website on the vulnerable App. As a result, the user may become a victim of a phishing attack.
AI-Powered Analysis
Technical Analysis
CVE-2025-41408 is a medium-severity vulnerability affecting the "Yahoo! Shopping" Android application developed by LY Corporation, specifically versions prior to 14.15.0. The vulnerability arises from improper authorization in the handler for a custom URL scheme within the app. Custom URL schemes are often used by mobile applications to enable deep linking or inter-app communication. In this case, the handler does not properly verify or restrict the URLs it processes, allowing a remote unauthenticated attacker to craft malicious links that, when clicked by a user, cause the app to open arbitrary websites. This behavior can be exploited to conduct phishing attacks by directing users to fraudulent websites that mimic legitimate services, potentially leading to credential theft or other social engineering outcomes. The vulnerability requires user interaction (clicking a malicious link) but no prior authentication or elevated privileges. The CVSS v3.0 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction, and impacting integrity only (no confidentiality or availability impact). No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on September 5, 2025, with no official patch links provided in the data, indicating that users should upgrade to version 14.15.0 or later once available to remediate the issue.
Potential Impact
For European organizations, the primary risk posed by this vulnerability is the facilitation of phishing attacks targeting employees or customers using the Yahoo! Shopping Android app. While the vulnerability does not directly compromise device confidentiality or availability, successful exploitation can lead to credential theft, unauthorized access to corporate accounts, or fraud if users are tricked into entering sensitive information on attacker-controlled websites. Retailers, e-commerce platforms, and financial institutions in Europe may face indirect impacts if their customers are targeted via this vector, potentially damaging brand reputation and customer trust. Additionally, organizations with BYOD (Bring Your Own Device) policies or that rely on mobile commerce apps should be aware of the increased phishing risk. The vulnerability’s exploitation requires user interaction, which somewhat limits its impact scope, but the widespread use of the Yahoo! Shopping app in certain European markets could increase exposure. Since the vulnerability affects only Android devices, organizations with a significant Android user base are more at risk. The lack of known exploits in the wild reduces immediate threat urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
1. Immediate mitigation involves educating users about the risks of clicking unsolicited or suspicious links, especially those purporting to open the Yahoo! Shopping app or related services. 2. Organizations should enforce mobile device management (MDM) policies that restrict installation of outdated app versions and encourage timely updates. 3. Monitor for phishing campaigns targeting users of the Yahoo! Shopping app and implement email and web filtering solutions to block malicious URLs. 4. Encourage users to update the Yahoo! Shopping app to version 14.15.0 or later as soon as the patch is available to ensure the vulnerability is remediated. 5. Developers and security teams should audit custom URL scheme handlers in mobile apps to ensure proper authorization and validation of input URLs to prevent similar vulnerabilities. 6. Implement multi-factor authentication (MFA) on critical services to reduce the impact of credential theft resulting from phishing. 7. Consider deploying endpoint protection solutions capable of detecting phishing attempts and malicious URL redirections on mobile devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-08-29T01:43:32.740Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68baeaa857c5b37b67a4621f
Added to database: 9/5/2025, 1:50:32 PM
Last enriched: 9/5/2025, 1:55:41 PM
Last updated: 9/5/2025, 1:55:41 PM
Views: 2
Related Threats
CVE-2025-10013: Improper Access Controls in Portabilis i-Educar
MediumCVE-2025-55037: Improper neutralization of special elements used in an OS command ('OS Command Injection') in kujirahand TkEasyGUI
CriticalCVE-2025-10011: SQL Injection in Portabilis i-Educar
MediumCVE-2025-10012: SQL Injection in Portabilis i-Educar
MediumCVE-2025-58780: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ScienceLogic SL1
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.