Opera Browser Vulnerability: Security Threats Explored and Mitigated

The widely-used Chromium-based browser, Opera, faced a security loophole enabling hackers to install files on Windows and macOS systems. Guardio Labs cybersecurity researchers discovered this vulnerability, promptly alerting and collaborating with the browser’s developers to address the issue.

Guardio Labs’ technical analysis attributes the flaw to My Flow, an inherent feature in the browser. This feature relies on Opera Touch Background, an extension bundled with the browser that cannot be technically uninstalled.

Opera Browser Vulnerability: Security Threats Explored and Mitigated

Exploiting a Landing Page

My Flow facilitates seamless note-taking and file-sharing between the desktop and mobile versions of the browser, aligning with the growing trend for unified desktop and mobile experiences. Unfortunately, this convenience opens a door to security risks.

The researchers highlight a critical flaw: the chat-like interface adds an “OPEN” link to any file-attached message, enabling immediate execution from the web interface. This suggests the webpage can interact with the system API, executing files outside the browser’s usual confines, devoid of sandbox or limits.

Another significant factor is My Flow’s ability to connect with specific web pages and extensions. Guardio Labs struck gold when they stumbled upon a “long-forgotten” version of the My Flow landing page on web.flow.opera.com, lacking crucial security measures.

Though visually similar to the current version, the forgotten page lacks a content security policy meta tag and includes a script tag calling for a JavaScript file without integrity checks. This vulnerability provides an avenue for code injection, granting access to high-permission native browser APIs.

In essence, a threat actor could craft an extension mimicking a mobile device, establishing a connection with the victim’s computer. By dropping an encrypted malicious code through a modified JavaScript file, the attacker tricks the user into running it with a simple click anywhere on the screen.

(Source: TheHackerNews)

Bidi Waid
Bidi Waidhttps://newfortech.com
A member of NewForTech’s in-house editorial team focusing on tech news, security, AI, opinions, and technology trends.

More From NewForTech

MWC 2026 Recap: The Biggest Phones, Gadgets, and Announcements From Barcelona

Walking into MWC 2026 expecting a phone show and finding a humanoid robot pouring tea in Hall 3 — that's the moment when this...

Google Pixel 10 Launches in March 2026 — Full Specs, Price, and What’s Different

The Google Pixel 10 family is now complete. Google's flagship models landed August 28, 2025, and the Pixel 10a — the budget anchor of...

Apple iOS 18.4 Drops With Expanded Apple Intelligence Features — What’s New

Apple iOS 18.4 landed on March 31, 2025, and it brings the most significant expansion of Apple Intelligence since the system launched with iOS...
Newsletter Free
Writing worth
reading.
Design, tech & ideas — no noise.
A
B
C

2,400+ readers · free · unsubscribe anytime