Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser

Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser

Posted on March 2, 2026 By CWS

A significant security vulnerability, classified as Universal Cross-Site Scripting (UXSS), was recently identified in the DuckDuckGo browser designed for Android devices. This flaw, assigned a high-severity score of 8.6 on the CVSS scale, allowed potentially malicious cross-origin iframes to execute arbitrary JavaScript within the main context of a webpage.

Details of the UXSS Vulnerability

The vulnerability was first brought to light in a detailed blog post by security researcher Dhiraj Mishra. The root of the issue lies within the DuckDuckGo Android app’s JavaScript bridge, known as “AutoconsentAndroid.” This bridge is intended to streamline communication between the browser’s native Android code and the web pages it renders.

However, a critical oversight in security allowed this bridge to accept messages from any frame, regardless of the origin. It lacked the necessary checks to verify the source or require authentication tokens, leading to a breach of the Same-Origin Policy (SOP), a fundamental web security principle.

Exploit Mechanism and Impact

The exploit stems from the bridge’s handling of incoming messages. When a message is received, an internal function processes it and executes the JavaScript using the webView.evaluateJavascript(…) method. This behavior allows code execution in the main document rather than the isolated iframe, posing a significant security risk.

This flaw could be exploited by embedding a malicious iframe within a legitimate web page, which then uses the “AutoconsentAndroid” bridge to execute harmful JavaScript in the main document. Such an attack could bypass SOP protections, potentially allowing attackers to steal sensitive data like session cookies or inject malicious content into trusted websites.

Response and Mitigation

The issue was responsibly reported to DuckDuckGo via the HackerOne platform and has been swiftly addressed. The company has since released updates to patch the vulnerability in its Android browser.

Given the serious nature of UXSS vulnerabilities, which can be exploited without user interaction, users and administrators are strongly advised to update their DuckDuckGo applications to the latest version. This action is crucial to safeguard against potential exploitation and ensure secure browsing.

For ongoing updates on cybersecurity threats and best practices, follow our channels on Google News, LinkedIn, and X. Stay informed and secure in the rapidly evolving digital landscape.

Cyber Security News Tags:Android, Browser, cross-origin, Cybersecurity, DuckDuckGo, Hack, JavaScript, Patch, Security, security flaw, Update, UXSS, Vulnerability, web security

Post navigation

Previous Post: US-Israel Cyber Operations Intensify Amid Iran Tensions
Next Post: Google’s Quantum-Resistant HTTPS Initiative in Chrome

Related Posts

Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Cyber Security News
AI Phishing Is Your Company’s Biggest Security Risk in 2026 AI Phishing Is Your Company’s Biggest Security Risk in 2026 Cyber Security News
Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials Google Warns of Threat Actors Using Fake Job Posting to Deliver Malware and Steal Credentials Cyber Security News
ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks ACSC Warns Of Sonicwall Access Control Vulnerability Actively Exploited In Attacks Cyber Security News
Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cisco Hacked – Attackers Stolen Profile Details of users Registered on Cisco.com Cyber Security News
New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face New Namespace Reuse Vulnerability Allows Remote Code Execution in Microsoft Azure AI, Google Vertex AI, and Hugging Face Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Criminal IP Showcases Threat Intelligence at RSAC 2026
  • Global Outage Disrupts Claude AI Services
  • APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch
  • Google’s Quantum-Resistant HTTPS Initiative in Chrome
  • Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Criminal IP Showcases Threat Intelligence at RSAC 2026
  • Global Outage Disrupts Claude AI Services
  • APT28 Exploits MSHTML Zero-Day Vulnerability Before Patch
  • Google’s Quantum-Resistant HTTPS Initiative in Chrome
  • Critical UXSS Vulnerability Patched in DuckDuckGo Android Browser

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News