First published: Mon Feb 20 2023(Updated: )
In Epiphany (aka GNOME Web) through 43.0, untrusted web content can trick users into exfiltrating passwords, because autofill occurs in sandboxed contexts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNOME Epiphany | <43.1 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26081 is a vulnerability in Epiphany (aka GNOME Web) through version 43.0 that allows untrusted web content to trick users into exfiltrating passwords.
Epiphany versions up to and including 43.0 are affected by CVE-2023-26081.
Untrusted web content can trick users into exfiltrating passwords in CVE-2023-26081 by taking advantage of autofill occurring in sandboxed contexts.
CVE-2023-26081 has a severity rating of 7.5, which is classified as high.
More information about CVE-2023-26081 can be found at the following references: [link1](https://github.com/google/security-research/security/advisories/GHSA-mhhf-w9xw-pp9x), [link2](https://gitlab.gnome.org/GNOME/epiphany/-/merge_requests/1275), [link3](https://lists.debian.org/debian-lts-announce/2023/05/msg00015.html)