CVE-2025-0087: Elevation of privilege in Google Android
In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user's app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI Analysis
Technical Summary
CVE-2025-0087 is a medium-severity local privilege escalation vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the onCreate method of the UninstallerActivity.java component, where a missing permission check allows an unprivileged local user to uninstall applications belonging to other users on the same device. This vulnerability arises from improper access control, specifically CWE-689 (Control Flow Manipulation). Exploitation does not require any additional execution privileges or user interaction, making it possible for a local attacker or malicious app to escalate privileges silently. The vulnerability impacts confidentiality slightly by enabling unauthorized removal of apps, and availability by potentially disrupting app functionality through uninstallation. The CVSS 3.1 base score is 5.1 (medium), reflecting the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights the importance of strict permission checks in multi-user Android environments to prevent unauthorized app management actions.
Potential Impact
For European organizations, this vulnerability could pose risks primarily on shared or multi-user Android devices, such as those used in enterprise mobility, kiosks, or shared work environments. Unauthorized uninstallation of critical business or security apps could lead to operational disruptions, loss of security controls, or exposure to further attacks if protective apps are removed. Although the confidentiality impact is limited, availability impact could affect business continuity, especially in sectors relying on mobile device management (MDM) solutions or secure app ecosystems. The lack of required user interaction increases the risk of stealthy exploitation by malicious insiders or compromised apps. Organizations with Bring Your Own Device (BYOD) policies or shared device usage should be particularly cautious. However, the vulnerability does not allow remote exploitation, limiting its impact to local attackers with device access.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strict device access controls to limit local user access, including strong lock screen policies and user authentication. 2) Restrict installation of untrusted or unnecessary apps that could exploit this vulnerability. 3) Monitor device logs for unusual app uninstallations or activity related to UninstallerActivity. 4) Deploy Mobile Device Management (MDM) solutions that can detect and prevent unauthorized app removals and enforce app whitelisting. 5) Educate users about the risks of installing apps from unknown sources and the importance of device security hygiene. 6) Stay alert for official patches or updates from Google and apply them promptly once available. 7) For shared devices, consider isolating user profiles or limiting app management capabilities to trusted administrators only. These steps go beyond generic advice by focusing on controlling local access and monitoring app uninstall behaviors specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Poland, Belgium, Ireland
CVE-2025-0087: Elevation of privilege in Google Android
Description
In onCreate of UninstallerActivity.java, there is a possible way to uninstall a different user's app due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
AI-Powered Analysis
Technical Analysis
CVE-2025-0087 is a medium-severity local privilege escalation vulnerability affecting Google Android versions 13, 14, and 15. The flaw exists in the onCreate method of the UninstallerActivity.java component, where a missing permission check allows an unprivileged local user to uninstall applications belonging to other users on the same device. This vulnerability arises from improper access control, specifically CWE-689 (Control Flow Manipulation). Exploitation does not require any additional execution privileges or user interaction, making it possible for a local attacker or malicious app to escalate privileges silently. The vulnerability impacts confidentiality slightly by enabling unauthorized removal of apps, and availability by potentially disrupting app functionality through uninstallation. The CVSS 3.1 base score is 5.1 (medium), reflecting the local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability highlights the importance of strict permission checks in multi-user Android environments to prevent unauthorized app management actions.
Potential Impact
For European organizations, this vulnerability could pose risks primarily on shared or multi-user Android devices, such as those used in enterprise mobility, kiosks, or shared work environments. Unauthorized uninstallation of critical business or security apps could lead to operational disruptions, loss of security controls, or exposure to further attacks if protective apps are removed. Although the confidentiality impact is limited, availability impact could affect business continuity, especially in sectors relying on mobile device management (MDM) solutions or secure app ecosystems. The lack of required user interaction increases the risk of stealthy exploitation by malicious insiders or compromised apps. Organizations with Bring Your Own Device (BYOD) policies or shared device usage should be particularly cautious. However, the vulnerability does not allow remote exploitation, limiting its impact to local attackers with device access.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strict device access controls to limit local user access, including strong lock screen policies and user authentication. 2) Restrict installation of untrusted or unnecessary apps that could exploit this vulnerability. 3) Monitor device logs for unusual app uninstallations or activity related to UninstallerActivity. 4) Deploy Mobile Device Management (MDM) solutions that can detect and prevent unauthorized app removals and enforce app whitelisting. 5) Educate users about the risks of installing apps from unknown sources and the importance of device security hygiene. 6) Stay alert for official patches or updates from Google and apply them promptly once available. 7) For shared devices, consider isolating user profiles or limiting app management capabilities to trusted administrators only. These steps go beyond generic advice by focusing on controlling local access and monitoring app uninstall behaviors specific to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- google_android
- Date Reserved
- 2024-12-13T16:56:09.215Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68b9d3bd88499799243bc13f
Added to database: 9/4/2025, 6:00:29 PM
Last enriched: 9/11/2025, 8:36:29 PM
Last updated: 10/18/2025, 8:09:59 AM
Views: 25
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11256: CWE-285 Improper Authorization in kognetiks Kognetiks Chatbot
MediumCVE-2025-10750: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in cyberlord92 PowerBI Embed Reports
MediumCVE-2025-9562: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Redirection for Contact Form 7
MediumCVE-2025-11741: CWE-639 Authorization Bypass Through User-Controlled Key in wpclever WPC Smart Quick View for WooCommerce
MediumCVE-2025-11703: CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data in wpgmaps WP Go Maps (formerly WP Google Maps)
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.