CVE-2025-10721: Improper Export of Android Application Components in Webull Investing & Trading App
A vulnerability was determined in Webull Investing & Trading App 11.2.5.63 on Android. This vulnerability affects unknown code of the file AndroidManifest.xml. This manipulation causes improper export of android application components. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-10721 is a medium-severity vulnerability identified in version 11.2.5.63 of the Webull Investing & Trading App on Android. The root cause lies in the improper export of Android application components as defined in the AndroidManifest.xml file. Specifically, certain components of the app are incorrectly marked as exported, allowing other local applications on the same device to interact with these components without proper authorization. This misconfiguration can lead to unauthorized access or manipulation of app functionality or data. The attack vector is local, meaning an attacker must have local access to the device, such as through installing a malicious app or having physical access. The vulnerability does not require user interaction and can be exploited with low attack complexity and low privileges, but it does not affect system confidentiality, integrity, or availability at a high level, as indicated by the CVSS 4.8 score. The vendor was notified but did not respond, and no patch has been published yet. Although the exploit has been publicly disclosed, there are no known exploits in the wild at this time. This vulnerability is significant because the Webull app handles sensitive financial and personal information, and improper component export could allow local attackers to escalate privileges or access sensitive data indirectly through the app's components.
Potential Impact
For European organizations, particularly those whose employees or clients use the Webull Android app, this vulnerability poses a moderate risk. If an attacker gains local access to a device, they could exploit the improperly exported components to interfere with the app's operations or access sensitive financial data. This could lead to unauthorized transactions, data leakage, or manipulation of trading activities. Financial institutions and investment firms using or recommending Webull could face reputational damage and regulatory scrutiny if client data or transactions are compromised. Additionally, the local nature of the attack means that organizations with Bring Your Own Device (BYOD) policies or less stringent mobile device management controls are more vulnerable. The lack of vendor response and patch availability increases the window of exposure, emphasizing the need for internal mitigations. However, since remote exploitation is not possible, the threat is somewhat contained to scenarios involving device compromise or insider threats.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strict mobile device management (MDM) policies that restrict installation of untrusted or unknown applications to reduce the risk of local malicious apps exploiting this vulnerability. 2) Educate users on the risks of installing apps from unofficial sources and the importance of device security hygiene. 3) Monitor devices for unusual app interactions or behaviors that could indicate exploitation attempts targeting Webull components. 4) Where possible, isolate or sandbox the Webull app environment to limit inter-app communication and reduce the impact of improperly exported components. 5) Encourage users to update the Webull app promptly once a patch is released. 6) Consider alternative trading platforms with better security track records if the risk is deemed unacceptable. 7) For organizations with sensitive financial operations, implement endpoint detection and response (EDR) solutions capable of detecting suspicious local privilege escalation or inter-process communication attempts. These targeted steps go beyond generic advice by focusing on controlling local access and inter-app interactions specific to this vulnerability.
Affected Countries
United Kingdom, Germany, France, Netherlands, Sweden, Ireland, Belgium
CVE-2025-10721: Improper Export of Android Application Components in Webull Investing & Trading App
Description
A vulnerability was determined in Webull Investing & Trading App 11.2.5.63 on Android. This vulnerability affects unknown code of the file AndroidManifest.xml. This manipulation causes improper export of android application components. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-10721 is a medium-severity vulnerability identified in version 11.2.5.63 of the Webull Investing & Trading App on Android. The root cause lies in the improper export of Android application components as defined in the AndroidManifest.xml file. Specifically, certain components of the app are incorrectly marked as exported, allowing other local applications on the same device to interact with these components without proper authorization. This misconfiguration can lead to unauthorized access or manipulation of app functionality or data. The attack vector is local, meaning an attacker must have local access to the device, such as through installing a malicious app or having physical access. The vulnerability does not require user interaction and can be exploited with low attack complexity and low privileges, but it does not affect system confidentiality, integrity, or availability at a high level, as indicated by the CVSS 4.8 score. The vendor was notified but did not respond, and no patch has been published yet. Although the exploit has been publicly disclosed, there are no known exploits in the wild at this time. This vulnerability is significant because the Webull app handles sensitive financial and personal information, and improper component export could allow local attackers to escalate privileges or access sensitive data indirectly through the app's components.
Potential Impact
For European organizations, particularly those whose employees or clients use the Webull Android app, this vulnerability poses a moderate risk. If an attacker gains local access to a device, they could exploit the improperly exported components to interfere with the app's operations or access sensitive financial data. This could lead to unauthorized transactions, data leakage, or manipulation of trading activities. Financial institutions and investment firms using or recommending Webull could face reputational damage and regulatory scrutiny if client data or transactions are compromised. Additionally, the local nature of the attack means that organizations with Bring Your Own Device (BYOD) policies or less stringent mobile device management controls are more vulnerable. The lack of vendor response and patch availability increases the window of exposure, emphasizing the need for internal mitigations. However, since remote exploitation is not possible, the threat is somewhat contained to scenarios involving device compromise or insider threats.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Enforce strict mobile device management (MDM) policies that restrict installation of untrusted or unknown applications to reduce the risk of local malicious apps exploiting this vulnerability. 2) Educate users on the risks of installing apps from unofficial sources and the importance of device security hygiene. 3) Monitor devices for unusual app interactions or behaviors that could indicate exploitation attempts targeting Webull components. 4) Where possible, isolate or sandbox the Webull app environment to limit inter-app communication and reduce the impact of improperly exported components. 5) Encourage users to update the Webull app promptly once a patch is released. 6) Consider alternative trading platforms with better security track records if the risk is deemed unacceptable. 7) For organizations with sensitive financial operations, implement endpoint detection and response (EDR) solutions capable of detecting suspicious local privilege escalation or inter-process communication attempts. These targeted steps go beyond generic advice by focusing on controlling local access and inter-app interactions specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-09-19T11:23:57.381Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68cd94ee4b8a032c4fabcb1e
Added to database: 9/19/2025, 5:37:50 PM
Last enriched: 9/19/2025, 5:53:02 PM
Last updated: 9/24/2025, 12:09:15 AM
Views: 11
Related Threats
CVE-2025-43779: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-57407: n/a
HighCVE-2025-29084: n/a
HighCVE-2025-29083: n/a
HighCVE-2025-55780: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.