CVE-2026-2378
Address Bar Spoofing in ArcSearch Android Before
Publication date: 2026-03-20
Last updated on: 2026-04-16
Assigner: BCNY
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| thebrowser | arc_search | to 1.12.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-1021 | The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain, which can lead to user confusion about which interface the user is interacting with. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update ArcSearch for Android to version 1.12.7 or later, as versions prior to 1.12.7 are affected by address bar spoofing.
Can you explain this vulnerability to me?
This vulnerability affects ArcSearch for Android versions prior to 1.12.7. It allows the address bar to display a different domain than the actual content being shown. This discrepancy can be triggered after user interaction with specially crafted web content, enabling an attacker to spoof the address bar.
How can this vulnerability impact me? :
The vulnerability can lead to address bar spoofing, which may trick users into believing they are visiting a legitimate website when they are not. This can facilitate phishing attacks or other malicious activities that rely on deceiving users about the true origin of the content they are viewing.