Skip to main content

CVE-2025-51497: n/a

Medium
VulnerabilityCVE-2025-51497cvecve-2025-51497
Published: Thu Jul 17 2025 (07/17/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in AdGuard plugin before 1.11.22 for Safari on MacOS. AdGaurd verbosely logged each url that Safari accessed when the plugin was active. These logs went into the MacOS general logs for any unsandboxed process to read. This may be disabled in version 1.11.22.

AI-Powered Analysis

AILast updated: 07/25/2025, 00:36:23 UTC

Technical Analysis

CVE-2025-51497 is a medium-severity vulnerability affecting the AdGuard plugin for Safari on macOS versions prior to 1.11.22. The issue arises from the plugin's verbose logging behavior, where every URL accessed by Safari while the plugin is active is recorded in the macOS general logs. These logs are accessible to any unsandboxed process on the system, potentially exposing sensitive browsing information to unauthorized local users or malicious software. The vulnerability is categorized under CWE-532, which relates to information exposure through log files. The CVSS v3.1 base score is 5.5, reflecting a local attack vector with low attack complexity, requiring low privileges but no user interaction. The impact primarily concerns confidentiality, as the URLs visited by the user could contain sensitive information such as private browsing habits, session tokens embedded in URLs, or access to confidential web resources. Integrity and availability are not impacted. The vulnerability does not require user interaction but does require local access with some privileges, limiting remote exploitation. Although no known exploits are reported in the wild, the exposure of browsing data in system logs represents a privacy risk and could facilitate further targeted attacks if combined with other vulnerabilities or malware. The issue is addressed by disabling verbose URL logging in AdGuard version 1.11.22 and later.

Potential Impact

For European organizations, this vulnerability poses a privacy and confidentiality risk, especially for employees or users handling sensitive or regulated data through Safari on macOS devices with the vulnerable AdGuard plugin installed. Exposure of browsing URLs could lead to leakage of confidential business information, intellectual property, or personally identifiable information (PII), potentially violating GDPR requirements on data protection and privacy. Attackers with local access could leverage this information for social engineering or lateral movement within corporate networks. Organizations with macOS endpoints using Safari and AdGuard are at risk of internal data leakage. While the vulnerability does not allow remote exploitation, insider threats or malware with local privileges could exploit it. This risk is particularly relevant for sectors with high privacy requirements such as finance, healthcare, legal, and government institutions within Europe.

Mitigation Recommendations

European organizations should ensure that all macOS endpoints running Safari have the AdGuard plugin updated to version 1.11.22 or later, where verbose URL logging is disabled. Endpoint management solutions should be used to enforce this update and verify plugin versions. Additionally, organizations should audit local log access permissions to restrict unsandboxed processes from reading general system logs. Implementing strict endpoint security controls, including application whitelisting and privilege management, can reduce the risk of unauthorized local access. Monitoring for unusual local process behavior that attempts to read system logs may help detect exploitation attempts. User awareness training should emphasize the risks of installing unverified plugins and the importance of timely updates. Finally, organizations should review their logging policies to avoid unnecessary exposure of sensitive information in logs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-16T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6879335fa83201eaace7af2a

Added to database: 7/17/2025, 5:31:11 PM

Last enriched: 7/25/2025, 12:36:23 AM

Last updated: 8/25/2025, 10:49:09 AM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats