A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it."
Metrics
Affected Vendors & Products
References
History
Tue, 19 Aug 2025 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it." | |
Title | AfterShip Package Tracker App com.aftership.AfterShip AndroidManifest.xml improper export of android application components | |
Weaknesses | CWE-926 | |
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published: 2025-08-19T10:32:06.355Z
Updated: 2025-08-19T13:17:45.555Z
Reserved: 2025-08-19T05:19:38.014Z
Link: CVE-2025-9134

No data.

Status : Awaiting Analysis
Published: 2025-08-19T11:15:29.810
Modified: 2025-08-19T14:15:43.623
Link: CVE-2025-9134

No data.