CVE-2025-52968
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-06-23

Last updated on: 2025-06-23

Assigner: MITRE

Description
xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-23
Last Modified
2025-06-23
Generated
2026-05-07
AI Q&A
2025-06-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-420 The product protects a primary channel, but it does not use the same level of protection for an alternate channel.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-52968 is a security issue in the xdg-open command used to open URLs in the system's default browser. When xdg-open launches a browser to open a URL, it treats the navigation as if the user manually typed the URL, causing SameSite=Strict cookies to be sent with the request. Normally, these cookies are excluded during in-browser navigation to prevent CSRF attacks. This behavior allows attackers to exploit CSRF vulnerabilities by sending requests with these cookies when links are opened via xdg-open, which weakens security compared to direct browser navigation. [1]


How can this vulnerability impact me? :

This vulnerability can enable Cross-Site Request Forgery (CSRF) attacks by allowing malicious links opened through xdg-open to send SameSite=Strict cookies with requests. This can lead to unauthorized actions being performed on behalf of a user without their consent, especially when external applications like email clients open untrusted links using xdg-open. As a result, attackers may exploit this to compromise user sessions or perform actions that should have been protected by browser cookie policies. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves monitoring whether xdg-open is used to open URLs that result in requests containing SameSite=Strict cookies, which normally should not be sent. Since the vulnerability arises from the behavior of xdg-open launching browsers with URLs treated as manually typed, you can detect suspicious usage by auditing calls to xdg-open and inspecting network traffic for requests that include SameSite=Strict cookies unexpectedly. Specific commands are not provided in the resources, but you might use system auditing tools to log invocations of xdg-open and network monitoring tools (e.g., tcpdump or Wireshark) to capture HTTP requests and check for SameSite=Strict cookies being sent. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating browsers to versions that support an "untrusted" mode or flag for opening external URLs, which prevents sending SameSite=Strict cookies in such contexts. Additionally, updating xdg-open to versions that can pass this "untrusted" context to browsers is recommended. Desktop environments and applications should be configured or updated to invoke xdg-open with this "untrusted" option when opening URLs from untrusted origins. Since no specific remediation has been finalized yet, monitoring updates from Linux distribution security teams and the oss-security mailing list is advised. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart