Impact
Zen Browser uses a function that turns RSS/Atom feed items into tabs with trusted privileges. The code that validates external URLs only checks the main feed URL for an http or https scheme, but the individual feed item links are not restricted. This discrepancy allows an attacker to supply a feed containing a non‑http/https link that will be added as a trusted lazy tab. If an attacker succeeds, they can execute code with elevated browser privileges, potentially compromising the user's system.
Affected Systems
Any installation of Zen Browser desktop prior to version 1.19.12b is affected. Vendors and systems that rely on the desktop edition and use the live‑folder RSS feature are in scope.
Risk and Exploitability
The CVSS score of 2.4 indicates that the technical impact is modest, yet the vulnerability enables the creation of trusted tabs from arbitrary feeds. Because a malicious feed can be presented to a local user, the attack vector is likely user‑initiated and local. EPSS data is not available, and the flaw is not listed in CISA’s KEV catalog, so it is not known to be actively exploited in the wild.
OpenCVE Enrichment