Impact
Malicious scripts can display attacker‑controlled web content under spoofed domains in Focus for iOS by stalling a self navigation to an invalid port and triggering an iframe redirect. The user interface is made to appear as a trusted domain without user interaction, enabling phishing or deceptive content delivery. Based on the description, it is inferred that this could lead to credential theft or social engineering attacks but does not provide remote code execution or direct data exfiltration.
Affected Systems
Mozilla Focus for iOS, all releases prior to v148.2. The vulnerability was fixed in Focus for iOS 148.2, so any version earlier than this is potentially affected.
Risk and Exploitability
The CVSS score is 4.3, indicating a low‑to‑moderate severity. The EPSS score is below 1%, implying a very low probability of exploitation under current threat conditions. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the attack vector most likely requires an attacker to supply malicious content that the app processes, which can be achieved through a crafted web page or a malicious link that the user opens in Focus for iOS.
OpenCVE Enrichment