Description
The client in Electronic Arts (EA) Origin 10.5.36 on Windows allows template injection in the title parameter of the Origin2 URI handler. This can be used to escape the underlying AngularJS sandbox and achieve remote code execution via an origin2://game/launch URL for QtApplication QDesktopServices communication.
Exploits (1)
exploitdb
WORKING POC
by Metin Yunus Kandemir · textwebappsphp
https://www.exploit-db.com/exploits/47021
References (12)
Scores
CVSS v3
7.8
EPSS
0.4073
EPSS Percentile
97.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-74
Status
published
Products (1)
ea/origin
10.5.36
Published
Apr 19, 2019
Tracked Since
Feb 18, 2026