Description
Fullscreen API Spoofing and UI Redressing in the handling of Fullscreen API and UI rendering in OpenAI Operator SaaS on Web allows a remote attacker to capture sensitive user input (e.g., login credentials, email addresses) via displaying a deceptive fullscreen interface with overlaid fake browser controls and a distracting element (like a cookie consent screen) to obscure fullscreen notifications, tricking the user into interacting with the malicious site.
INFO
Published Date :
2025-07-10T19:09:40.590Z
Last Modified :
2025-07-10T20:29:32.210Z
Source :
AFFECTED PRODUCTS
The following products are affected by CVE-2025-7021 vulnerability.
| Vendors | Products |
|---|---|
| Openai |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-7021.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact