Unprotected Alternate Channel Affecting xdg-utils package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-XDGUTILS-10494295
  • published24 Jun 2025
  • disclosed23 Jun 2025

Introduced: 23 Jun 2025

NewCVE-2025-52968  (opens in a new tab)
CWE-420  (opens in a new tab)

How to fix?

There is no fixed version for Debian:unstable xdg-utils.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xdg-utils package and not the xdg-utils package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin.

CVSS Base Scores

version 3.1