Unrated severityNVD Advisory· Published Jul 10, 2025· Updated Jul 10, 2025
OpenAI Operator - API Spoofing through Locking Operator on FullScreen
CVE-2025-7021
Description
Fullscreen API Spoofing and UI Redressing in the handling of Fullscreen API and UI rendering in OpenAI Operator SaaS on Web allows a remote attacker to capture sensitive user input (e.g., login credentials, email addresses) via displaying a deceptive fullscreen interface with overlaid fake browser controls and a distracting element (like a cookie consent screen) to obscure fullscreen notifications, tricking the user into interacting with the malicious site.
Affected products
2- OpenAI/Operatorv5Range: SaaS
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.