CVE-2025-56139
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-03

Last updated on: 2025-09-08

Assigner: MITRE

Description
LinkedIn Mobile Application for Android version 4.1.1087.2 fails to update link preview metadata (image, title, description) when a user replaces the original URL in a post or comment before publishing. As a result, the stale preview remains visible while the clickable link points to a different URL, which can be malicious. This UI misrepresentation enables attackers to deceive users by displaying trusted previews for harmful links, facilitating phishing attacks and user confusion.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-03
Last Modified
2025-09-08
Generated
2026-05-07
AI Q&A
2025-09-03
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linkedin linkedin 4.1.1087.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-449 The UI performs the wrong action with respect to the user's request.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-56139 is a vulnerability in the LinkedIn mobile application for Android (version 4.1.1110 and earlier) where the app fails to update the link preview metadata (image, title, description) when a user replaces the original URL in a post or comment before publishing. This causes the displayed preview to remain stale and correspond to the original URL, while the actual clickable link points to a different, potentially malicious URL. This UI misrepresentation can deceive users into trusting harmful links, facilitating phishing attacks and user confusion. [1, 2]


How can this vulnerability impact me? :

This vulnerability can impact users by enabling attackers to deceive them with legitimate-looking link previews that actually lead to malicious sites. This can result in phishing attacks where users may enter credentials into fake login portals, theft of sensitive personal or corporate data, redirection to malware-hosting sites, and exploitation of LinkedIn's advertising system to spread malicious links. It undermines user trust and can lead to account compromise, data theft, malware infection, and espionage risks. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is specific to the LinkedIn mobile application (Android version 4.1.1110 and earlier) and involves a UI misrepresentation where the link preview does not update when a URL is replaced before publishing. Detection involves observing posts or comments where the displayed preview metadata (image, title, description) does not match the actual clickable URL destination. Since this is a client-side UI issue in the LinkedIn app, network or system commands alone may not reliably detect it. Manual inspection of posts on the vulnerable LinkedIn mobile app version to verify if the preview matches the final URL is recommended. Automated detection might require custom scripts or tools that compare preview metadata with actual link destinations in posts, but no specific commands are provided in the resources. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include avoiding the use of the vulnerable LinkedIn mobile app versions (4.1.1110 and earlier) for posting or interacting with links. Users should verify that the preview metadata matches the actual URL before clicking links or publishing posts. LinkedIn users should prefer using the LinkedIn web interface, which correctly updates link previews and is not vulnerable. Additionally, users should be cautious of unexpected or suspicious links even if the preview appears legitimate. LinkedIn is recommended to implement automatic invalidation and regeneration of previews when URLs are changed, provide UI warnings when links are modified after preview generation, and clearly display the actual destination URL to users before clicking. Since no fix is currently available, user awareness and cautious behavior are key immediate mitigations. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart