CVE-2025-7021: OpenAI Operator: fullscreen spoofing captures credentials
MEDIUM PoC AVAILABLE CISA: TRACK*OpenAI Operator users are vulnerable to a UI redressing attack where malicious sites trigger browser fullscreen mode to overlay fake browser chrome and phishing forms, capturing credentials. No confirmed patch exists; brief users that legitimate Operator sessions will never request credentials via fullscreen overlays. Restrict Operator to allowlisted domains until OpenAI issues a fix.
Risk Assessment
Medium severity (CVSS 6.5) with high confidentiality impact. Low attack complexity and no privileges required makes this accessible to unsophisticated attackers. Risk is amplified in AI agent contexts: users delegating browsing to Operator are less attentive to UI anomalies, and the trust boundary between real browser chrome and Operator-rendered content is already blurred. Any organization using Operator for employee workflows is exposed.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| operator | pip | — | No patch |
Do you use operator? You're affected.
Severity & Risk
Attack Surface
Recommended Action
6 steps-
Restrict Operator usage to an approved allowlist of vetted domains via policy.
-
Brief all Operator users: no legitimate session requests credentials through a fullscreen overlay — treat any such prompt as an attack.
-
Where possible, apply browser-level CSP or enterprise policy to restrict Fullscreen API on unrecognized domains.
-
Deploy browser extensions that visually alert on fullscreen transitions.
-
Review Operator session logs for navigation to unknown or newly registered domains.
-
Subscribe to OpenAI security advisories and apply patches immediately when available.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-7021?
OpenAI Operator users are vulnerable to a UI redressing attack where malicious sites trigger browser fullscreen mode to overlay fake browser chrome and phishing forms, capturing credentials. No confirmed patch exists; brief users that legitimate Operator sessions will never request credentials via fullscreen overlays. Restrict Operator to allowlisted domains until OpenAI issues a fix.
Is CVE-2025-7021 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2025-7021, increasing the risk of exploitation.
How to fix CVE-2025-7021?
1. Restrict Operator usage to an approved allowlist of vetted domains via policy. 2. Brief all Operator users: no legitimate session requests credentials through a fullscreen overlay — treat any such prompt as an attack. 3. Where possible, apply browser-level CSP or enterprise policy to restrict Fullscreen API on unrecognized domains. 4. Deploy browser extensions that visually alert on fullscreen transitions. 5. Review Operator session logs for navigation to unknown or newly registered domains. 6. Subscribe to OpenAI security advisories and apply patches immediately when available.
What systems are affected by CVE-2025-7021?
This vulnerability affects the following AI/ML architecture patterns: AI agent frameworks, web-based AI interfaces, LLM-powered browser automation.
What is the CVSS score for CVE-2025-7021?
CVE-2025-7021 has a CVSS v3.1 base score of 6.5 (MEDIUM). The EPSS exploitation probability is 0.19%.
Technical Details
NVD Description
Fullscreen API Spoofing and UI Redressing in the handling of Fullscreen API and UI rendering in OpenAI Operator SaaS on Web allows a remote attacker to capture sensitive user input (e.g., login credentials, email addresses) via displaying a deceptive fullscreen interface with overlaid fake browser controls and a distracting element (like a cookie consent screen) to obscure fullscreen notifications, tricking the user into interacting with the malicious site.
Exploitation Scenario
Attacker registers a domain mimicking a legitimate SaaS tool (e.g., fake SSO or corporate portal). Via SEO poisoning or indirect prompt injection embedded in a document Operator is tasked with browsing, the agent navigates to the malicious page. The page calls requestFullscreen(), rendering a pixel-perfect fake browser window. A fake cookie consent banner is overlaid to obscure the browser's built-in fullscreen notification bar. The user, already trusting the Operator session, enters login credentials or PII into the fake form. Credentials are exfiltrated server-side with no malware required.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N References
Timeline
Related Vulnerabilities
CVE-2025-53767 10.0 Azure OpenAI: SSRF EoP, no auth required (CVSS 10)
Same package: openai CVE-2023-3686 9.8 QuickAI: unauthenticated SQLi exposes OpenAI API keys
Same package: openai CVE-2025-65805 7.5 OAI CN5G AMF: Unauthenticated buffer overflow, RCE/DoS
Same package: openai CVE-2025-66786 7.5 OAI CN5G AMF: unauthenticated JSON DoS on 5G SBI interface
Same package: openai CVE-2025-26265 6.5 openairinterface5g: segfault enables DoS via crafted UE message
Same package: openai
AI Threat Alert