CVE-2025-25300

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-25300
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25300.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-25300
Aliases
Related
Published
2025-02-18T18:15:35Z
Modified
2025-07-29T11:21:09.290512Z
Summary
[none]
Details

smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner View link and navigating to 3rd party page leaves window.opener exposed. It may allow hostile third parties to abuse window.opener, e.g. by redirection or injection on the original page with smartbanner. rel="noopener" is automatically populated to links as of v1.14.1 which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure View link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If View link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, rel="noopener" is imposed on all target="_blank" links. Version 1.14.1 of smartbanner.js contains a fix for the issue.

References

Affected packages

Git / github.com/ain/smartbanner.js

Affected ranges

Type
GIT
Repo
https://github.com/ain/smartbanner.js
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1

v1.*

v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.1.0
v1.1.1
v1.10.0
v1.10.1
v1.11.0
v1.12.0
v1.13.0
v1.14.0
v1.2.0
v1.3.0
v1.4.0
v1.4.1
v1.5.0
v1.6.0
v1.7.0
v1.8.0
v1.9.0
v1.9.1