CVE-2025-56139
BaseFortify
Publication date: 2025-09-03
Last updated on: 2025-09-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| 4.1.1087.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-449 | The UI performs the wrong action with respect to the user's request. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-56139 is a vulnerability in the LinkedIn mobile application for Android (version 4.1.1110 and earlier) where the app fails to update the link preview metadata (image, title, description) when a user replaces the original URL in a post or comment before publishing. This causes the displayed preview to remain stale and correspond to the original URL, while the actual clickable link points to a different, potentially malicious URL. This UI misrepresentation can deceive users into trusting harmful links, facilitating phishing attacks and user confusion. [1, 2]
How can this vulnerability impact me? :
This vulnerability can impact users by enabling attackers to deceive them with legitimate-looking link previews that actually lead to malicious sites. This can result in phishing attacks where users may enter credentials into fake login portals, theft of sensitive personal or corporate data, redirection to malware-hosting sites, and exploitation of LinkedIn's advertising system to spread malicious links. It undermines user trust and can lead to account compromise, data theft, malware infection, and espionage risks. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is specific to the LinkedIn mobile application (Android version 4.1.1110 and earlier) and involves a UI misrepresentation where the link preview does not update when a URL is replaced before publishing. Detection involves observing posts or comments where the displayed preview metadata (image, title, description) does not match the actual clickable URL destination. Since this is a client-side UI issue in the LinkedIn app, network or system commands alone may not reliably detect it. Manual inspection of posts on the vulnerable LinkedIn mobile app version to verify if the preview matches the final URL is recommended. Automated detection might require custom scripts or tools that compare preview metadata with actual link destinations in posts, but no specific commands are provided in the resources. [1, 2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include avoiding the use of the vulnerable LinkedIn mobile app versions (4.1.1110 and earlier) for posting or interacting with links. Users should verify that the preview metadata matches the actual URL before clicking links or publishing posts. LinkedIn users should prefer using the LinkedIn web interface, which correctly updates link previews and is not vulnerable. Additionally, users should be cautious of unexpected or suspicious links even if the preview appears legitimate. LinkedIn is recommended to implement automatic invalidation and regeneration of previews when URLs are changed, provide UI warnings when links are modified after preview generation, and clearly display the actual destination URL to users before clicking. Since no fix is currently available, user awareness and cautious behavior are key immediate mitigations. [1, 2]