CVE-2025-41408: Improper authorization in handler for custom URL scheme in LY Corporation "Yahoo! Shopping" App for Android
Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthenticated attacker may lead a user to access an arbitrary website on the vulnerable App. As a result, the user may become a victim of a phishing attack.
AI Analysis
Technical Summary
CVE-2025-41408 is a medium-severity vulnerability affecting the "Yahoo! Shopping" Android application developed by LY Corporation, specifically versions prior to 14.15.0. The vulnerability arises from improper authorization in the handler for a custom URL scheme within the app. Custom URL schemes are often used by mobile applications to enable deep linking or inter-app communication. In this case, the handler does not properly verify or restrict the URLs it processes, allowing a remote unauthenticated attacker to craft malicious links that, when clicked by a user, cause the app to open arbitrary websites. This behavior can be exploited to conduct phishing attacks by directing users to fraudulent websites that mimic legitimate services, potentially leading to credential theft or other social engineering outcomes. The vulnerability requires user interaction (clicking a malicious link) but no prior authentication or elevated privileges. The CVSS v3.0 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction, and impacting integrity only (no confidentiality or availability impact). No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on September 5, 2025, with no official patch links provided in the data, indicating that users should upgrade to version 14.15.0 or later once available to remediate the issue.
Potential Impact
For European organizations, the primary risk posed by this vulnerability is the facilitation of phishing attacks targeting employees or customers using the Yahoo! Shopping Android app. While the vulnerability does not directly compromise device confidentiality or availability, successful exploitation can lead to credential theft, unauthorized access to corporate accounts, or fraud if users are tricked into entering sensitive information on attacker-controlled websites. Retailers, e-commerce platforms, and financial institutions in Europe may face indirect impacts if their customers are targeted via this vector, potentially damaging brand reputation and customer trust. Additionally, organizations with BYOD (Bring Your Own Device) policies or that rely on mobile commerce apps should be aware of the increased phishing risk. The vulnerability’s exploitation requires user interaction, which somewhat limits its impact scope, but the widespread use of the Yahoo! Shopping app in certain European markets could increase exposure. Since the vulnerability affects only Android devices, organizations with a significant Android user base are more at risk. The lack of known exploits in the wild reduces immediate threat urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
1. Immediate mitigation involves educating users about the risks of clicking unsolicited or suspicious links, especially those purporting to open the Yahoo! Shopping app or related services. 2. Organizations should enforce mobile device management (MDM) policies that restrict installation of outdated app versions and encourage timely updates. 3. Monitor for phishing campaigns targeting users of the Yahoo! Shopping app and implement email and web filtering solutions to block malicious URLs. 4. Encourage users to update the Yahoo! Shopping app to version 14.15.0 or later as soon as the patch is available to ensure the vulnerability is remediated. 5. Developers and security teams should audit custom URL scheme handlers in mobile apps to ensure proper authorization and validation of input URLs to prevent similar vulnerabilities. 6. Implement multi-factor authentication (MFA) on critical services to reduce the impact of credential theft resulting from phishing. 7. Consider deploying endpoint protection solutions capable of detecting phishing attempts and malicious URL redirections on mobile devices.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden
CVE-2025-41408: Improper authorization in handler for custom URL scheme in LY Corporation "Yahoo! Shopping" App for Android
Description
Improper authorization in handler for custom URL scheme issue in "Yahoo! Shopping" App for Android versions prior to 14.15.0 allows a remote unauthenticated attacker may lead a user to access an arbitrary website on the vulnerable App. As a result, the user may become a victim of a phishing attack.
AI-Powered Analysis
Technical Analysis
CVE-2025-41408 is a medium-severity vulnerability affecting the "Yahoo! Shopping" Android application developed by LY Corporation, specifically versions prior to 14.15.0. The vulnerability arises from improper authorization in the handler for a custom URL scheme within the app. Custom URL schemes are often used by mobile applications to enable deep linking or inter-app communication. In this case, the handler does not properly verify or restrict the URLs it processes, allowing a remote unauthenticated attacker to craft malicious links that, when clicked by a user, cause the app to open arbitrary websites. This behavior can be exploited to conduct phishing attacks by directing users to fraudulent websites that mimic legitimate services, potentially leading to credential theft or other social engineering outcomes. The vulnerability requires user interaction (clicking a malicious link) but no prior authentication or elevated privileges. The CVSS v3.0 base score is 4.3, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction, and impacting integrity only (no confidentiality or availability impact). No known exploits are currently reported in the wild. The vulnerability was publicly disclosed on September 5, 2025, with no official patch links provided in the data, indicating that users should upgrade to version 14.15.0 or later once available to remediate the issue.
Potential Impact
For European organizations, the primary risk posed by this vulnerability is the facilitation of phishing attacks targeting employees or customers using the Yahoo! Shopping Android app. While the vulnerability does not directly compromise device confidentiality or availability, successful exploitation can lead to credential theft, unauthorized access to corporate accounts, or fraud if users are tricked into entering sensitive information on attacker-controlled websites. Retailers, e-commerce platforms, and financial institutions in Europe may face indirect impacts if their customers are targeted via this vector, potentially damaging brand reputation and customer trust. Additionally, organizations with BYOD (Bring Your Own Device) policies or that rely on mobile commerce apps should be aware of the increased phishing risk. The vulnerability’s exploitation requires user interaction, which somewhat limits its impact scope, but the widespread use of the Yahoo! Shopping app in certain European markets could increase exposure. Since the vulnerability affects only Android devices, organizations with a significant Android user base are more at risk. The lack of known exploits in the wild reduces immediate threat urgency but does not eliminate the risk of future exploitation.
Mitigation Recommendations
1. Immediate mitigation involves educating users about the risks of clicking unsolicited or suspicious links, especially those purporting to open the Yahoo! Shopping app or related services. 2. Organizations should enforce mobile device management (MDM) policies that restrict installation of outdated app versions and encourage timely updates. 3. Monitor for phishing campaigns targeting users of the Yahoo! Shopping app and implement email and web filtering solutions to block malicious URLs. 4. Encourage users to update the Yahoo! Shopping app to version 14.15.0 or later as soon as the patch is available to ensure the vulnerability is remediated. 5. Developers and security teams should audit custom URL scheme handlers in mobile apps to ensure proper authorization and validation of input URLs to prevent similar vulnerabilities. 6. Implement multi-factor authentication (MFA) on critical services to reduce the impact of credential theft resulting from phishing. 7. Consider deploying endpoint protection solutions capable of detecting phishing attempts and malicious URL redirections on mobile devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-08-29T01:43:32.740Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68baeaa857c5b37b67a4621f
Added to database: 9/5/2025, 1:50:32 PM
Last enriched: 9/5/2025, 1:55:41 PM
Last updated: 10/18/2025, 3:50:15 PM
Views: 48
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-47410: CWE-352 Cross-Site Request Forgery (CSRF) in Apache Software Foundation Apache Geode
HighCVE-2025-11926: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdreams Related Posts Lite
MediumCVE-2025-9890: CWE-352 Cross-Site Request Forgery (CSRF) in mndpsingh287 Theme Editor
HighCVE-2025-5555: Stack-based Buffer Overflow in Nixdorf Wincor PORT IO Driver
HighCVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.