Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0661 | smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue. |
Github GHSA |
GHSA-9mrq-cjgh-32g2 | smartbanner.js rel noopener vulnerability |
Tue, 18 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Feb 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | smartbanner.js rel noopener vulnerability | smartbanner.js rel noopener XSS vulnerability |
| Weaknesses | CWE-601 | |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 18 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | smartbanner.js rel noopener XSS vulnerability | smartbanner.js rel noopener vulnerability |
| Weaknesses | CWE-601 | |
| Metrics |
cvssV4_0
|
cvssV4_0
|
Tue, 18 Feb 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue. | |
| Title | smartbanner.js rel noopener XSS vulnerability | |
| Weaknesses | CWE-601 CWE-79 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-18T18:53:49.770Z
Reserved: 2025-02-06T17:13:33.123Z
Link: CVE-2025-25300
Updated: 2025-02-18T18:53:31.592Z
Status : Deferred
Published: 2025-02-18T18:15:35.330
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-25300
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA