Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5009: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Google Gemini

0
Low
VulnerabilityCVE-2025-5009cvecve-2025-5009cwe-359
Published: Wed Oct 08 2025 (10/08/2025, 15:31:22 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Gemini

Description

In Gemini iOS, when a user shared a snippet of a conversation, it would share the entire conversation via a sharable public link that contained the entire conversation history and not just the snippet.

AI-Powered Analysis

AILast updated: 01/22/2026, 20:03:26 UTC

Technical Analysis

CVE-2025-5009 is a privacy vulnerability affecting Google Gemini on iOS devices. When a user attempts to share a snippet of a conversation, the application mistakenly generates a public link that includes the entire conversation history rather than just the selected snippet. This flaw falls under CWE-359, which concerns the exposure of private personal information to unauthorized actors. The vulnerability arises from improper handling of shared content, leading to unintended data disclosure. The CVSS 4.0 vector indicates that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), partial authentication (PR:H), and user interaction (UI:A). The impact on confidentiality is low but present, with no direct effect on integrity or availability. No known exploits have been reported, and no patches have been released at the time of publication. The issue primarily affects users who share conversation snippets via Gemini on iOS, potentially exposing sensitive personal information to anyone with access to the generated public link. This vulnerability highlights the importance of secure data sharing mechanisms and careful access control in messaging applications.

Potential Impact

For European organizations, the primary impact of this vulnerability is the inadvertent exposure of private conversation data when users share snippets via Google Gemini on iOS. This could lead to privacy breaches, especially if sensitive or confidential information is contained within conversations. Organizations subject to strict data protection regulations such as GDPR may face compliance risks if such exposures occur. While the vulnerability does not directly compromise system integrity or availability, the leakage of personal or corporate information could damage reputation and trust. The low CVSS score reflects limited exploitability and scope, but the privacy implications remain significant, particularly for sectors handling sensitive data such as finance, healthcare, and government. The lack of a patch means organizations must rely on user awareness and interim controls to mitigate risk.

Mitigation Recommendations

1. Educate users about the risk of sharing conversation snippets via Google Gemini on iOS and advise caution when generating shareable links. 2. Implement organizational policies restricting the sharing of sensitive information through Gemini until a patch is available. 3. Monitor official Google communications for updates or patches addressing CVE-2025-5009 and apply them promptly. 4. Use mobile device management (MDM) solutions to control or restrict the use of Gemini on corporate iOS devices if feasible. 5. Encourage users to verify the content of shared links before distribution to ensure only intended information is exposed. 6. Audit and review shared links periodically to detect any unintended data exposure. 7. Consider alternative secure communication tools with robust data sharing controls for sensitive conversations. 8. Engage with Google support channels to report concerns and request timely remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Google
Date Reserved
2025-05-20T13:43:12.869Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e6855f620140f5ffd6acb9

Added to database: 10/8/2025, 3:38:07 PM

Last enriched: 1/22/2026, 8:03:26 PM

Last updated: 2/7/2026, 10:46:54 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats