{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-62583","assignerOrgId":"f9629fae-ca2e-4fbf-9785-3ed86476aef6","state":"PUBLISHED","assignerShortName":"naver","dateReserved":"2025-10-16T06:44:59.553Z","datePublished":"2025-10-16T06:52:12.797Z","dateUpdated":"2025-10-16T14:09:03.582Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"cweId":"CWE-358","description":"CWE-358 Improperly Implemented Security Check for Standard","lang":"en","type":"CWE"}]}],"affected":[{"vendor":"NAVER","product":"NAVER Whale browser","versions":[{"status":"unaffected","version":"4.33.325.17"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"Whale Browser before 4.33.325.17 allows an attacker to escape the iframe sandbox in a dual-tab environment."}],"credits":[{"lang":"en","value":"Mingi Jung, mingijung.grape@gmail.com, Ulsan National Institute of Science and Technology-Web Sec Lab","type":"finder"}],"references":[{"name":"NAVER Security Advisory","tags":["vendor-advisory"],"url":"https://cve.naver.com/detail/cve-2025-62583.html"}],"source":{"discovery":"EXTERNAL"},"providerMetadata":{"orgId":"f9629fae-ca2e-4fbf-9785-3ed86476aef6","shortName":"naver","dateUpdated":"2025-10-16T06:52:12.797Z"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-10-16T13:58:39.555252Z","id":"CVE-2025-62583","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-16T14:09:03.582Z"}}]}}