CVE-2025-3839
Linux Debian vulnerability analysis and mitigation

Overview

A security vulnerability was identified in Epiphany browser (CVE-2025-3839) that allows websites to open external URL handler applications with minimal user interaction. The vulnerability was discovered and reported on April 21, 2025, affecting multiple versions of the Epiphany browser across various Linux distributions (Debian Tracker, Ubuntu Security).

Technical details

The vulnerability relates to the URL handling mechanism in Epiphany browser, where external applications can be triggered to open URLs without proper user interaction validation. The issue has been confirmed to affect multiple versions of the browser, including those in Debian distributions from Bullseye through Sid, and Ubuntu releases from 16.04 LTS through 25.04 (Debian Tracker).

Impact

The vulnerability could potentially allow malicious websites to trigger external applications without proper user consent, which could lead to unauthorized application execution or unintended system behavior (Debian Tracker).

Mitigation and workarounds

A fix has been implemented and is available in Epiphany browser version 48.1-1 and later. The fix was implemented through two commits: 324e25caee659bce43ff5c614d105f64899dfb7f (version 48.1) and 9f80e7e80b75212627790d74041d46eedb6e321e (version 47.5) (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related Linux Debian vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-67726HIGH7.5
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-67725HIGH7.5
  • Linux DebianLinux Debian
  • python-tornado
NoNoDec 12, 2025
CVE-2025-11266MEDIUM6.8
  • Linux DebianLinux Debian
  • gdcm
NoNoDec 12, 2025
CVE-2025-67749MEDIUM5.3
  • Linux DebianLinux Debian
  • pcsx2
NoNoDec 12, 2025
CVE-2025-40345N/AN/A
  • Linux KernelLinux Kernel
  • kernel-headers
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management