{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14021","assignerOrgId":"657f3255-0560-4aed-82e4-7f579ec6acfb","state":"PUBLISHED","assignerShortName":"LY-Corporation","dateReserved":"2025-12-04T11:44:56.068Z","datePublished":"2025-12-15T06:41:37.992Z","dateUpdated":"2025-12-15T15:49:07.716Z"},"containers":{"cna":{"affected":[{"vendor":"LINE Corporation","product":"LINE client for iOS","versions":[{"version":"14.13","status":"affected","versionType":"custom","lessThan":"14.14"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"na"}]}],"descriptions":[{"lang":"en","value":"The in-app browser in LINE client for iOS versions prior to 14.14 is vulnerable to address bar spoofing, which could allow attackers to execute malicious JavaScript within iframes while displaying trusted URLs, enabling phishing attacks through overlaid malicious content."}],"references":[{"url":"https://hackerone.com/reports/2548498"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":4.3,"baseSeverity":"MEDIUM","exploitCodeMaturity":"NOT_DEFINED","remediationLevel":"NOT_DEFINED","reportConfidence":"NOT_DEFINED","temporalScore":4.3,"temporalSeverity":"MEDIUM","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NETWORK","modifiedAttackComplexity":"LOW","modifiedPrivilegesRequired":"NONE","modifiedUserInteraction":"REQUIRED","modifiedScope":"UNCHANGED","modifiedConfidentialityImpact":"NONE","modifiedIntegrityImpact":"LOW","modifiedAvailabilityImpact":"NONE","environmentalScore":4.3,"environmentalSeverity":"MEDIUM"}}],"providerMetadata":{"orgId":"657f3255-0560-4aed-82e4-7f579ec6acfb","shortName":"LY-Corporation","dateUpdated":"2025-12-15T06:45:46.378Z"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-451","lang":"en","description":"CWE-451 User Interface (UI) Misrepresentation of Critical Information"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-15T15:48:45.634591Z","id":"CVE-2025-14021","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-15T15:49:07.716Z"}}]}}