Description

A security vulnerability has been discovered in the Brave Browser, which could allow malicious websites to disguise themselves as trusted sites during file upload or download operations. This issue, identified as CVE-2025-23086, affects certain desktop versions of Brave, posing a potential risk to users who may be unaware of the threat. The flaw is present in Brave Browser versions 1.70.x to 1.73.x, where a feature designed to show the website’s origin in the operating system’s file selector dialog fails to properly detect the origin in specific scenarios. This could lead to a situation where the file dialog displays an incorrect, trusted origin instead of the actual malicious site. Exploiting this vulnerability in conjunction with an open redirector issue on a legitimate, trusted website could enable attackers to trigger file downloads that appear to come from the trusted site. For instance, when a user interacts with a malicious site that uses an open redirect on a trusted domain, the file selector dialog might display the trusted domain as the source, even though the file is coming from the malicious site. This deceptive display could mislead users into thinking the action is legitimate, potentially exposing them to phishing attacks or causing them to unknowingly download malicious files.