CVE-2025-14020
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-15

Last updated on: 2025-12-18

Assigner: LINE Corporation

Description
LINE client for Android versions prior to 14.20 contains a UI spoofing vulnerability in the in-app browser where the full-screen security Toast notification is not properly re-displayed when users return from another application, potentially allowing attackers to conduct phishing attacks by impersonating legitimate interfaces.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linecorp line to 14.20.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-451 The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a UI spoofing issue in the LINE client for Android versions before 14.20. It occurs in the in-app browser where the full-screen security Toast notification does not properly reappear when users switch back from another application. This flaw could allow attackers to trick users by displaying fake interfaces that look legitimate.


How can this vulnerability impact me? :

The vulnerability can impact you by enabling attackers to perform phishing attacks through impersonation of legitimate interfaces within the app. This could lead to users being deceived into providing sensitive information or performing unintended actions.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the LINE client for Android to version 14.20 or later where the UI spoofing issue in the in-app browser has been fixed. Avoid using vulnerable versions and be cautious when interacting with in-app browser content, especially after switching between applications.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart