CVE-2026-44659
Address Bar Spoofing in Zen Browser
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zen | browser | to 1.19.12b (inc) |
| zen_browser | zen_browser | to 1.19.12b (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-451 | The user interface (UI) does not properly represent critical information to the user, allowing the information - or its source - to be obscured or spoofed. This is often a component in phishing attacks. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability in ZEN Browser allows attackers to spoof the address bar by truncating long hostnames and hiding the actual registrable domain, which can mislead users and facilitate phishing and supply-chain attacks.
While the provided information does not explicitly mention compliance with standards such as GDPR or HIPAA, this type of vulnerability can indirectly impact compliance by undermining user trust and potentially exposing users to phishing attacks that may lead to unauthorized access or data breaches.
Therefore, organizations relying on ZEN Browser or affected versions might face increased risk of security incidents that could affect their obligations under regulations requiring protection of personal data and secure user interactions.
Can you explain this vulnerability to me?
The CVE-2026-44659 vulnerability in ZEN Browser involves address bar spoofing through long subdomains.
The browser incorrectly truncates long hostnames in the address bar, displaying only the attacker-controlled prefix of the subdomain while hiding the actual registrable domain (eTLD+1).
This allows attackers to craft malicious subdomains that visually mimic trusted brands, misleading users about the site's true origin.
The issue arises because the browser truncates URLs from the right, exposing only the spoofed prefix and hiding the legitimate domain, which compromises the address bar as a security indicator.
This vulnerability enables phishing and supply-chain attacks and affects ZEN Browser versions up to 1.19.11b, with a patch available in version 1.19.12b.
How can this vulnerability impact me? :
This vulnerability can mislead users into believing they are visiting a trusted website when they are actually on a malicious site.
Attackers can exploit this by crafting long malicious subdomains that visually imitate trusted brands, leading to phishing attacks.
Because the browser hides the actual registrable domain, users may unknowingly disclose sensitive information or credentials to attackers.
It also creates a supply-chain attack vector by compromising the integrity of the URL bar as a security indicator.
The vulnerability has a moderate severity with a CVSS score of 4.7 and requires user interaction but no special privileges or network access.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the ZEN Browser incorrectly truncating long hostnames in the address bar, which is a UI issue rather than a network or system anomaly that can be detected by commands.
Detection would primarily involve verifying the browser version in use and testing URL display behavior with crafted long subdomains to see if the truncation and spoofing occur.
Specifically, you can check the installed ZEN Browser version to see if it is prior to 1.19.12b, which is vulnerable.
- On Windows, check the version via the browser's About page or by running: `zen-browser --version` in a command prompt if available.
- On Linux or macOS, run: `zen-browser --version` or check the installed package version.
To test the vulnerability, manually navigate to URLs with very long subdomains that mimic trusted brands and observe if the address bar truncates the hostname incorrectly.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the ZEN Browser to version 1.19.12b or later, where the vulnerability has been fixed.
Until the update is applied, users should be cautious when clicking on links with long subdomains and verify the actual domain carefully, as the address bar may be misleading.
Educate users about the risk of phishing attacks exploiting this vulnerability and encourage them to verify URLs through other means if suspicious.