Vulnerability Description
smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It may allow hostile third parties to abuse `window.opener`, e.g. by redirection or injection on the original page with smartbanner. `rel="noopener"` is automatically populated to links as of `v1.14.1` which is a recommended upgrade to resolve the vulnerability. Some workarounds are available for those who cannot upgrade. Ensure `View` link is only taking users to App Store or Google Play Store where security is guarded by respective app store security teams. If `View` link is going to a third party page, limit smartbanner.js to be used on iOS that decreases the scope of the vulnerability since as of Safari 12.1, `rel="noopener"` is imposed on all `target="_blank"` links. Version 1.14.1 of smartbanner.js contains a fix for the issue.
Related Weaknesses (CWE)
References
- https://github.com/ain/smartbanner.js/commit/fce8c31dfe04033d9d005a89694d3e7a607
- https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2
- https://github.com/ain/smartbanner.js/security/advisories/GHSA-9mrq-cjgh-32g2
FAQ
What is CVE-2025-25300?
CVE-2025-25300 is a documented vulnerability. smartbanner.js is a customizable smart app banner for iOS and Android. Prior to version 1.14.1, clicking on smartbanner `View` link and navigating to 3rd party page leaves `window.opener` exposed. It ...
How severe is CVE-2025-25300?
CVSS scoring is not yet available for CVE-2025-25300. Check NVD for updates.
Is there a patch for CVE-2025-25300?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.