Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5009: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Google Gemini

0
Low
VulnerabilityCVE-2025-5009cvecve-2025-5009cwe-359
Published: Wed Oct 08 2025 (10/08/2025, 15:31:22 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Gemini

Description

In Gemini iOS, when a user shared a snippet of a conversation, it would share the entire conversation via a sharable public link that contained the entire conversation history and not just the snippet.

AI-Powered Analysis

AILast updated: 10/08/2025, 15:38:49 UTC

Technical Analysis

CVE-2025-5009 identifies a vulnerability in the Google Gemini iOS application related to improper handling of conversation snippet sharing. When a user attempts to share only a snippet of a conversation, the application mistakenly generates a public link containing the entire conversation history instead of just the selected snippet. This behavior results in exposure of private personal information to unauthorized actors who can access the link. The vulnerability is categorized under CWE-359, which involves the exposure of private information to unauthorized parties. The CVSS 4.0 vector indicates that the attack requires an authenticated user (PR:H) and user interaction (UI:A), with low complexity (AC:L) and low confidentiality impact (VC:L). The attack vector is adjacent network (AV:A), meaning the attacker must be on a network segment close to the victim. There is no impact on integrity or availability. No patches or known exploits are currently available, and the vulnerability was published in October 2025. The affected version is listed as '0', likely indicating an early or initial release of Gemini on iOS. This vulnerability primarily risks confidentiality by exposing more data than intended during sharing operations. The issue arises from insufficient access control or improper link generation logic that fails to limit shared content scope. Given the nature of the vulnerability, it is exploitable only if a user intentionally shares a snippet, and an attacker gains access to the generated link. This limits the attack surface but still poses privacy risks, especially in environments handling sensitive or regulated data.

Potential Impact

For European organizations, the primary impact of CVE-2025-5009 is the inadvertent exposure of private personal information, which can lead to violations of data protection regulations such as the GDPR. Unauthorized access to entire conversation histories could result in leakage of sensitive business communications, personal data of employees or customers, and intellectual property. This exposure could damage organizational reputation, lead to regulatory fines, and erode trust. The vulnerability's requirement for user interaction and authentication reduces the likelihood of widespread exploitation but does not eliminate insider threat risks or accidental data leaks. Organizations relying on Google Gemini for internal or customer communications on iOS devices may face challenges ensuring data confidentiality. The low CVSS score reflects limited technical severity but does not diminish the potential compliance and privacy implications. Additionally, the public sharing of conversation histories could be leveraged in social engineering or targeted phishing attacks if sensitive context is revealed. Overall, the impact is primarily on confidentiality and privacy compliance rather than system availability or integrity.

Mitigation Recommendations

To mitigate CVE-2025-5009, European organizations should implement the following specific measures: 1) Immediately audit and restrict the sharing functionality within Google Gemini on iOS to ensure that only the intended snippet is shared, not the entire conversation. 2) Work with Google to obtain patches or updates that correct the link generation logic and enforce strict access controls on shared content. 3) Educate users about the risks of sharing conversation snippets and encourage verification of shared links before distribution. 4) Implement monitoring and alerting for unusual sharing activity or access patterns to detect potential data leaks. 5) Employ data loss prevention (DLP) solutions that can detect and block unauthorized sharing of sensitive information via public links. 6) Review and update organizational policies regarding use of third-party communication tools, emphasizing privacy and data protection requirements. 7) Where possible, disable or limit public link sharing features until the vulnerability is resolved. 8) Conduct regular privacy impact assessments to identify and address similar risks in communication platforms. These targeted actions go beyond generic advice by focusing on controlling the specific sharing mechanism and user behavior related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Google
Date Reserved
2025-05-20T13:43:12.869Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e6855f620140f5ffd6acb9

Added to database: 10/8/2025, 3:38:07 PM

Last enriched: 10/8/2025, 3:38:49 PM

Last updated: 10/8/2025, 11:05:56 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats