CVE-2025-24803

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensecurity:mobile_security_framework:4.3.0:*:*:*:*:*:*:*

History

07 Jul 2025, 13:41

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
References () https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier - () https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier - Technical Description
References () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83 - () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83 - Patch
References () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-cxqq-w3x5-7ph3 - () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-cxqq-w3x5-7ph3 - Exploit, Vendor Advisory
CPE cpe:2.3:a:opensecurity:mobile_security_framework:4.3.0:*:*:*:*:*:*:*
First Time Opensecurity
Opensecurity mobile Security Framework
Summary
  • (es) Mobile Security Framework (MobSF) es un framework automatizado y todo en uno para pruebas de penetración, análisis de malware y evaluación de seguridad de aplicaciones móviles (Android/iOS/Windows). Según la documentación de Apple para los identificadores de paquete, estos deben contener solo caracteres alfanuméricos (A–Z, a–z y 0–9), guiones (-) y puntos (.). Sin embargo, un atacante puede modificar manualmente este valor en el archivo `Info.plist` y agregar caracteres especiales al valor `CFBundleIdentifier`. El archivo `dynamic_analysis.html` no desinfecta el valor del paquete recibido de Corellium y, como resultado, es posible romper el contexto HTML y lograr XSS almacenado. Este problema se ha solucionado en la versión 4.3.1 y se recomienda a todos los usuarios que actualicen. No existen workarounds para esta vulnerabilidad.

05 Feb 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-05 19:15

Updated : 2025-07-07 13:41


NVD link : CVE-2025-24803

Mitre link : CVE-2025-24803

CVE.ORG link : CVE-2025-24803


JSON object : View

Products Affected

opensecurity

  • mobile_security_framework
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')