Search for vulnerabilities
| Vulnerability ID | VCID-qu2d-vqp3-w3e3 |
| Aliases |
CVE-2025-3839
|
| Summary | A flaw was found in Epiphany, a tool that allows websites to open external URL handler applications with minimal user interaction. This design can be misused to exploit vulnerabilities within those handlers, making them appear remotely exploitable. The browser fails to properly warn or gate this action, resulting in potential code execution on the client device via trusted UI behavior. |
| Status | Published |
| Exploitability | 0.5 |
| Weighted Severity | 7.2 |
| Risk | 3.6 |
| Affected and Fixed Packages | Package Details |
| System | Score | Found at |
|---|---|---|
| cvssv3.1 | 8 | https://access.redhat.com/security/cve/CVE-2025-3839 |
| ssvc | Track | https://access.redhat.com/security/cve/CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| epss | 0.00018 | https://api.first.org/data/v1/epss?cve=CVE-2025-3839 |
| cvssv3.1 | 8 | https://bugzilla.redhat.com/show_bug.cgi?id=2361430 |
| ssvc | Track | https://bugzilla.redhat.com/show_bug.cgi?id=2361430 |
| cvssv3.1 | 8 | https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml |
| Reference id | Reference type | URL |
|---|---|---|
| https://api.first.org/data/v1/epss?cve=CVE-2025-3839 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3839 | ||
| https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml | ||
| CVE-2025-3839 | https://access.redhat.com/security/cve/CVE-2025-3839 | |
| show_bug.cgi?id=2361430 | https://bugzilla.redhat.com/show_bug.cgi?id=2361430 |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Attack Vector (AV) | Attack Complexity (AC) | Privileges Required (PR) | User Interaction (UI) | Scope (S) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
|---|---|---|---|---|---|---|---|
network adjacent_network local physical |
low high |
none low high |
none required |
unchanged changed |
high low none |
high low none |
high low none |
| Percentile | 0.04377 |
| EPSS Score | 0.00018 |
| Published At | April 2, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T16:38:43.564224+00:00 | Debian Oval Importer | Import | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 38.0.0 |