CVE-2026-2378 (GCVE-0-2026-2378)
Vulnerability from cvelistv5 – Published: 2026-03-20 21:16 – Updated: 2026-03-23 14:13
VLAI?
Title
Address bar spoofing risk in ArcSearch on Android
Summary
ArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content.
Severity ?
7.4 (High)
CWE
- CWE-1021 - Improper restriction of rendered UI layers or frames
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| The BrowserCompany of New York | ArcSearch |
Affected:
0 , < 1.12.7
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2026-2378",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-23T14:12:56.298860Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-03-23T14:13:09.052Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"packageName": "company.thebrowser.arc",
"platforms": [
"Android"
],
"product": "ArcSearch",
"vendor": "The BrowserCompany of New York",
"versions": [
{
"lessThan": "1.12.7",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content.\u003c/p\u003e"
}
],
"value": "ArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content."
}
],
"impacts": [
{
"capecId": "CAPEC-154",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-154 Resource Location Spoofing"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1021",
"description": "CWE-1021 Improper restriction of rendered UI layers or frames",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-20T21:16:51.942Z",
"orgId": "59469e6c-7ea7-446f-8e43-06aa32c115e8",
"shortName": "BCNY"
},
"references": [
{
"url": "https://arc.net/security/bulletins"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Address bar spoofing risk in ArcSearch on Android",
"x_generator": {
"engine": "Vulnogram 1.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "59469e6c-7ea7-446f-8e43-06aa32c115e8",
"assignerShortName": "BCNY",
"cveId": "CVE-2026-2378",
"datePublished": "2026-03-20T21:16:51.942Z",
"dateReserved": "2026-02-11T21:24:56.878Z",
"dateUpdated": "2026-03-23T14:13:09.052Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2026-2378",
"date": "2026-04-20",
"epss": "0.00032",
"percentile": "0.09022"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2026-2378\",\"sourceIdentifier\":\"59469e6c-7ea7-446f-8e43-06aa32c115e8\",\"published\":\"2026-03-20T22:16:27.497\",\"lastModified\":\"2026-04-16T14:34:33.427\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content.\"},{\"lang\":\"es\",\"value\":\"ArcSearch para versiones de Android anteriores a la 1.12.7 podr\u00eda mostrar un dominio diferente en la barra de direcciones al contenido que se mostraba, permitiendo la suplantaci\u00f3n de la barra de direcciones despu\u00e9s de la interacci\u00f3n del usuario mediante contenido web manipulado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"59469e6c-7ea7-446f-8e43-06aa32c115e8\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\",\"baseScore\":7.4,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"59469e6c-7ea7-446f-8e43-06aa32c115e8\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1021\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:thebrowser:arc_search:*:*:*:*:*:android:*:*\",\"versionEndExcluding\":\"1.12.7\",\"matchCriteriaId\":\"4E59F856-9B31-43D7-9969-9281627E6DEC\"}]}]}],\"references\":[{\"url\":\"https://arc.net/security/bulletins\",\"source\":\"59469e6c-7ea7-446f-8e43-06aa32c115e8\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-2378\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-23T14:12:56.298860Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-23T14:13:05.578Z\"}}], \"cna\": {\"title\": \"Address bar spoofing risk in ArcSearch on Android\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-154\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-154 Resource Location Spoofing\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"The BrowserCompany of New York\", \"product\": \"ArcSearch\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"1.12.7\", \"versionType\": \"semver\"}], \"platforms\": [\"Android\"], \"packageName\": \"company.thebrowser.arc\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://arc.net/security/bulletins\"}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eArcSearch for Android versions prior to 1.12.7 could display a different domain in the address bar than the content being shown, enabling address bar spoofing after user interaction via crafted web content.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1021\", \"description\": \"CWE-1021 Improper restriction of rendered UI layers or frames\"}]}], \"providerMetadata\": {\"orgId\": \"59469e6c-7ea7-446f-8e43-06aa32c115e8\", \"shortName\": \"BCNY\", \"dateUpdated\": \"2026-03-20T21:16:51.942Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-2378\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-23T14:13:09.052Z\", \"dateReserved\": \"2026-02-11T21:24:56.878Z\", \"assignerOrgId\": \"59469e6c-7ea7-446f-8e43-06aa32c115e8\", \"datePublished\": \"2026-03-20T21:16:51.942Z\", \"assignerShortName\": \"BCNY\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…