CVE-2026-44659

Published: Mag 11, 2026 Last Modified: Mag 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 4,7
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: changed
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

Zen is a firefox-based browser. Prior to 1.19.12b, the ZEN Browser incorrectly truncates long hostnames in the address bar and shows only the attacker-controlled prefix of the subdomain, hiding the actual registrable domain (eTLD+1). As a result, an attacker can craft extremely long malicious subdomains that visually imitate trusted brands, and the browser will display only the spoofed prefix, misleading users about the actual origin of the site. This directly compromises the URL bar as a security indicator and creates a phishing/supply-chain attack vector. This vulnerability is fixed in 1.19.12b.

451

User Interface (UI) Misrepresentation of Critical Information

Draft
Common Consequences
Security Scopes Affected:
Non-Repudiation Access Control
Potential Impacts:
Hide Activities Bypass Protection Mechanism
Applicable Platforms
All platforms may be affected
View CWE Details
https://github.com/zen-browser/desktop/security/advisories/GHSA-7p2r-fp29-9w69