A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it."
References
Configurations
No configuration.
History
19 Aug 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md - | |
References | () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce - |
19 Aug 2025, 13:42
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
19 Aug 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-19 11:15
Updated : 2025-08-19 14:15
NVD link : CVE-2025-9134
Mitre link : CVE-2025-9134
CVE.ORG link : CVE-2025-9134
JSON object : View
Products Affected
No product.
CWE
CWE-926
Improper Export of Android Application Components