Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser

Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser

Posted on March 2, 2026 By CWS

A significant security vulnerability, classified as Universal Cross-Site Scripting (UXSS), was recently identified in the DuckDuckGo browser designed for Android devices. This flaw, assigned a high-severity score of 8.6 on the CVSS scale, allowed potentially malicious cross-origin iframes to execute arbitrary JavaScript within the main context of a webpage.

Details of the UXSS Vulnerability

The vulnerability was first brought to light in a detailed blog post by security researcher Dhiraj Mishra. The root of the issue lies within the DuckDuckGo Android app’s JavaScript bridge, known as “AutoconsentAndroid.” This bridge is intended to streamline communication between the browser’s native Android code and the web pages it renders.

However, a critical oversight in security allowed this bridge to accept messages from any frame, regardless of the origin. It lacked the necessary checks to verify the source or require authentication tokens, leading to a breach of the Same-Origin Policy (SOP), a fundamental web security principle.

Exploit Mechanism and Impact

The exploit stems from the bridge’s handling of incoming messages. When a message is received, an internal function processes it and executes the JavaScript using the webView.evaluateJavascript(…) method. This behavior allows code execution in the main document rather than the isolated iframe, posing a significant security risk.

This flaw could be exploited by embedding a malicious iframe within a legitimate web page, which then uses the “AutoconsentAndroid” bridge to execute harmful JavaScript in the main document. Such an attack could bypass SOP protections, potentially allowing attackers to steal sensitive data like session cookies or inject malicious content into trusted websites.

Response and Mitigation

The issue was responsibly reported to DuckDuckGo via the HackerOne platform and has been swiftly addressed. The company has since released updates to patch the vulnerability in its Android browser.

Given the serious nature of UXSS vulnerabilities, which can be exploited without user interaction, users and administrators are strongly advised to update their DuckDuckGo applications to the latest version. This action is crucial to safeguard against potential exploitation and ensure secure browsing.

For ongoing updates on cybersecurity threats and best practices, follow our channels on Google News, LinkedIn, and X. Stay informed and secure in the rapidly evolving digital landscape.

Cyber Security News Tags:Android, Browser, cross-origin, Cybersecurity, DuckDuckGo, Hack, JavaScript, Patch, Security, security flaw, Update, UXSS, Vulnerability, web security

Post navigation

Previous Post: US-Israel Cyber Operations Intensify Amid Iran Tensions
Next Post: Google’s Quantum-Resistant HTTPS Initiative in Chrome

Related Posts

Critical IP-KVM Flaws Expose Enterprise Networks Critical IP-KVM Flaws Expose Enterprise Networks Cyber Security News
Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Windows Packer pkr_mtsi Powers Widespread Malvertising Campaigns Delivering Multiple Malware Families Cyber Security News
Microsoft Confirms New Outlook Bug Blocking Excel Attachments Microsoft Confirms New Outlook Bug Blocking Excel Attachments Cyber Security News
Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code Windows Graphics Vulnerabilities Allow Remote Attackers to Execute Arbitrary Code Cyber Security News
Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Cyber Security News
Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Linux CUPS Vulnerability Let Attackers Remote DoS and Bypass Authentication Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • ATHR Platform Revolutionizes Large-Scale Vishing Attacks
  • White House to Discuss AI Advancements with Anthropic CEO
  • Anthropic Launches Claude Opus 4.7 with Enhanced Security Features
  • Mirai Malware Exploits Vulnerable TP-Link Routers
  • Counterfeit Ledger Wallets in China Pose Crypto Security Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • ATHR Platform Revolutionizes Large-Scale Vishing Attacks
  • White House to Discuss AI Advancements with Anthropic CEO
  • Anthropic Launches Claude Opus 4.7 with Enhanced Security Features
  • Mirai Malware Exploits Vulnerable TP-Link Routers
  • Counterfeit Ledger Wallets in China Pose Crypto Security Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark