CVE-2025-5009: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Google Gemini
In Gemini iOS, when a user shared a snippet of a conversation, it would share the entire conversation via a sharable public link that contained the entire conversation history and not just the snippet.
AI Analysis
Technical Summary
CVE-2025-5009 is a privacy vulnerability affecting Google Gemini on iOS devices. When a user attempts to share a snippet of a conversation, the application mistakenly generates a public link that includes the entire conversation history rather than just the selected snippet. This flaw falls under CWE-359, which concerns the exposure of private personal information to unauthorized actors. The vulnerability arises from improper handling of shared content, leading to unintended data disclosure. The CVSS 4.0 vector indicates that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), partial authentication (PR:H), and user interaction (UI:A). The impact on confidentiality is low but present, with no direct effect on integrity or availability. No known exploits have been reported, and no patches have been released at the time of publication. The issue primarily affects users who share conversation snippets via Gemini on iOS, potentially exposing sensitive personal information to anyone with access to the generated public link. This vulnerability highlights the importance of secure data sharing mechanisms and careful access control in messaging applications.
Potential Impact
For European organizations, the primary impact of this vulnerability is the inadvertent exposure of private conversation data when users share snippets via Google Gemini on iOS. This could lead to privacy breaches, especially if sensitive or confidential information is contained within conversations. Organizations subject to strict data protection regulations such as GDPR may face compliance risks if such exposures occur. While the vulnerability does not directly compromise system integrity or availability, the leakage of personal or corporate information could damage reputation and trust. The low CVSS score reflects limited exploitability and scope, but the privacy implications remain significant, particularly for sectors handling sensitive data such as finance, healthcare, and government. The lack of a patch means organizations must rely on user awareness and interim controls to mitigate risk.
Mitigation Recommendations
1. Educate users about the risk of sharing conversation snippets via Google Gemini on iOS and advise caution when generating shareable links. 2. Implement organizational policies restricting the sharing of sensitive information through Gemini until a patch is available. 3. Monitor official Google communications for updates or patches addressing CVE-2025-5009 and apply them promptly. 4. Use mobile device management (MDM) solutions to control or restrict the use of Gemini on corporate iOS devices if feasible. 5. Encourage users to verify the content of shared links before distribution to ensure only intended information is exposed. 6. Audit and review shared links periodically to detect any unintended data exposure. 7. Consider alternative secure communication tools with robust data sharing controls for sensitive conversations. 8. Engage with Google support channels to report concerns and request timely remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-5009: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Google Gemini
Description
In Gemini iOS, when a user shared a snippet of a conversation, it would share the entire conversation via a sharable public link that contained the entire conversation history and not just the snippet.
AI-Powered Analysis
Technical Analysis
CVE-2025-5009 is a privacy vulnerability affecting Google Gemini on iOS devices. When a user attempts to share a snippet of a conversation, the application mistakenly generates a public link that includes the entire conversation history rather than just the selected snippet. This flaw falls under CWE-359, which concerns the exposure of private personal information to unauthorized actors. The vulnerability arises from improper handling of shared content, leading to unintended data disclosure. The CVSS 4.0 vector indicates that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), partial authentication (PR:H), and user interaction (UI:A). The impact on confidentiality is low but present, with no direct effect on integrity or availability. No known exploits have been reported, and no patches have been released at the time of publication. The issue primarily affects users who share conversation snippets via Gemini on iOS, potentially exposing sensitive personal information to anyone with access to the generated public link. This vulnerability highlights the importance of secure data sharing mechanisms and careful access control in messaging applications.
Potential Impact
For European organizations, the primary impact of this vulnerability is the inadvertent exposure of private conversation data when users share snippets via Google Gemini on iOS. This could lead to privacy breaches, especially if sensitive or confidential information is contained within conversations. Organizations subject to strict data protection regulations such as GDPR may face compliance risks if such exposures occur. While the vulnerability does not directly compromise system integrity or availability, the leakage of personal or corporate information could damage reputation and trust. The low CVSS score reflects limited exploitability and scope, but the privacy implications remain significant, particularly for sectors handling sensitive data such as finance, healthcare, and government. The lack of a patch means organizations must rely on user awareness and interim controls to mitigate risk.
Mitigation Recommendations
1. Educate users about the risk of sharing conversation snippets via Google Gemini on iOS and advise caution when generating shareable links. 2. Implement organizational policies restricting the sharing of sensitive information through Gemini until a patch is available. 3. Monitor official Google communications for updates or patches addressing CVE-2025-5009 and apply them promptly. 4. Use mobile device management (MDM) solutions to control or restrict the use of Gemini on corporate iOS devices if feasible. 5. Encourage users to verify the content of shared links before distribution to ensure only intended information is exposed. 6. Audit and review shared links periodically to detect any unintended data exposure. 7. Consider alternative secure communication tools with robust data sharing controls for sensitive conversations. 8. Engage with Google support channels to report concerns and request timely remediation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Date Reserved
- 2025-05-20T13:43:12.869Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68e6855f620140f5ffd6acb9
Added to database: 10/8/2025, 3:38:07 PM
Last enriched: 1/22/2026, 8:03:26 PM
Last updated: 2/7/2026, 10:46:54 AM
Views: 105
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.