Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to execute arbitrary JavaScript in a privileged context. This flaw enables modification of browser configuration and execution of arbitrary code through Maxthon’s exposed DOM APIs, including maxthon.program.Program.launch() and maxthon.io.writeDataURL(). Exploitation requires user interaction, typically by visiting a malicious webpage that triggers the injection.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 07 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Thu, 07 Aug 2025 07:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Maxthon
         Maxthon maxthon Maxthon maxthon Browser  | 
|
| Vendors & Products | 
        
        Maxthon
         Maxthon maxthon Maxthon maxthon Browser  | 
Tue, 05 Aug 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browser’s trusted zone improperly handles injected script content, allowing attackers to execute arbitrary JavaScript in a privileged context. This flaw enables modification of browser configuration and execution of arbitrary code through Maxthon’s exposed DOM APIs, including maxthon.program.Program.launch() and maxthon.io.writeDataURL(). Exploitation requires user interaction, typically by visiting a malicious webpage that triggers the injection. | |
| Title | Maxthon3 about:history XCS Trusted Zone Code Execution | |
| Weaknesses | CWE-79 CWE-94  | 
|
| References | 
         | 
        
  | 
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-08-05T20:03:14.736Z
Updated: 2025-08-07T13:58:54.181Z
Reserved: 2025-08-05T17:04:41.092Z
Link: CVE-2012-10032
Updated: 2025-08-07T13:56:27.104Z
Status : Awaiting Analysis
Published: 2025-08-05T20:15:34.327
Modified: 2025-08-07T14:15:40.343
Link: CVE-2012-10032
No data.