Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Mon, 07 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Opensecurity
Opensecurity mobile Security Framework |
|
CPEs | cpe:2.3:a:opensecurity:mobile_security_framework:4.3.0:*:*:*:*:*:*:* | |
Vendors & Products |
Opensecurity
Opensecurity mobile Security Framework |
|
Metrics |
cvssV3_1
|
Wed, 12 Feb 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 05 Feb 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A–Z, a–z, and 0–9), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `<key>CFBundleIdentifier</key>` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Stored Cross-Site Scripting (XSS) in MobSF | |
Weaknesses | CWE-79 | |
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-05T18:41:30.040Z
Updated: 2025-02-12T19:41:05.505Z
Reserved: 2025-01-23T17:11:35.839Z
Link: CVE-2025-24803

Updated: 2025-02-12T19:39:15.840Z

Status : Analyzed
Published: 2025-02-05T19:15:46.207
Modified: 2025-07-07T13:41:11.010
Link: CVE-2025-24803

No data.