← Volver a CVEs
CVE-2025-9134
MEDIUM5.3
Descripcion
A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it."
Detalles CVE
Puntuacion CVSS v3.15.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Vector de ataqueLOCAL
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado8/19/2025
Ultima modificacion4/29/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
aftership:aftership_package_tracker
Debilidades (CWE)
CWE-926
Referencias
https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce(cna@vuldb.com)
https://vuldb.com/?ctiid.320514(cna@vuldb.com)
https://vuldb.com/?id.320514(cna@vuldb.com)
https://vuldb.com/?submit.615253(cna@vuldb.com)
https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md(134c704f-9b21-4f2e-91b3-4a467353bcc0)
https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.