CVE-2025-11598: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Centralny Ośrodek Informatyki mObywatel
CVE-2025-11598 is a low-severity vulnerability in the mObywatel iOS application developed by Centralny Ośrodek Informatyki. The flaw allows unauthorized users to view private personal information through the iOS App Switcher when the app is minimized, even after the user has logged out. The exposed data depends on the last screen viewed before minimizing the app. This issue does not require privileged access but does require user interaction to minimize the app. The vulnerability was fixed in version 4. 71. 0 of the application. There are no known exploits in the wild, and the CVSS score is 1. European organizations using mObywatel should ensure they update to the patched version to prevent unintended data exposure. The impact is limited to confidentiality and does not affect integrity or availability.
AI Analysis
Technical Summary
CVE-2025-11598 is a privacy exposure vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting the mObywatel iOS application, which is a digital identity app managed by Centralny Ośrodek Informatyki in Poland. The vulnerability arises because when the app is minimized on iOS devices, the App Switcher interface displays a snapshot of the app’s last active screen. If the user had sensitive personal information visible before minimizing, this data remains visible in the App Switcher even after the user logs out. This means an unauthorized person with physical access to the device can view personal data without needing to authenticate or unlock the app. The exposure depends on the last viewed screen, so the extent of data leakage varies. The vulnerability does not affect the app’s backend or data integrity but compromises confidentiality. It requires user interaction (minimizing the app) and physical access to the device but no privileged access or complex exploitation techniques. The issue was addressed and fixed in version 4.71.0 by presumably clearing or obscuring sensitive information before the app transitions to the background or by controlling the snapshot behavior. The CVSS 4.0 score is 1.0, reflecting low severity due to limited impact and exploitation complexity. There are no known active exploits or widespread attacks leveraging this vulnerability. The vulnerability is specific to iOS devices running vulnerable versions of mObywatel and does not affect other platforms or apps.
Potential Impact
For European organizations, particularly those in Poland where mObywatel is widely used as a government-issued digital identity app, this vulnerability poses a privacy risk by exposing personal data to unauthorized individuals with physical access to a user’s iOS device. The impact is primarily on confidentiality, potentially revealing sensitive identity information that could be used for social engineering or identity theft. However, the vulnerability does not compromise data integrity or availability, nor does it allow remote exploitation. The risk is mitigated by the requirement of physical access and user interaction (minimizing the app). Nonetheless, organizations relying on mObywatel for identity verification or citizen services should be aware of this exposure risk and ensure users update to the fixed version. The vulnerability could undermine user trust in digital identity solutions if not addressed promptly. Other European countries using mObywatel or similar apps are less affected due to limited adoption.
Mitigation Recommendations
1. Immediate update of the mObywatel iOS application to version 4.71.0 or later, which contains the fix for this vulnerability. 2. Educate users to fully close or lock the app before leaving their device unattended to prevent unauthorized viewing of sensitive information in the App Switcher. 3. Encourage use of device-level security features such as biometric locks and strong passcodes to reduce the risk of physical access by unauthorized actors. 4. For organizations, implement policies that restrict device sharing and enforce secure device handling practices. 5. Monitor for any unofficial or outdated app versions in use within the organization and mandate updates. 6. Advocate for app developers to implement secure backgrounding practices, such as obscuring or blanking sensitive screens when the app is minimized. 7. Consider additional mobile device management (MDM) controls to enforce app updates and secure app usage policies. 8. Conduct user awareness campaigns highlighting the risks of leaving sensitive apps visible in the App Switcher.
Affected Countries
Poland
CVE-2025-11598: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Centralny Ośrodek Informatyki mObywatel
Description
CVE-2025-11598 is a low-severity vulnerability in the mObywatel iOS application developed by Centralny Ośrodek Informatyki. The flaw allows unauthorized users to view private personal information through the iOS App Switcher when the app is minimized, even after the user has logged out. The exposed data depends on the last screen viewed before minimizing the app. This issue does not require privileged access but does require user interaction to minimize the app. The vulnerability was fixed in version 4. 71. 0 of the application. There are no known exploits in the wild, and the CVSS score is 1. European organizations using mObywatel should ensure they update to the patched version to prevent unintended data exposure. The impact is limited to confidentiality and does not affect integrity or availability.
AI-Powered Analysis
Technical Analysis
CVE-2025-11598 is a privacy exposure vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) affecting the mObywatel iOS application, which is a digital identity app managed by Centralny Ośrodek Informatyki in Poland. The vulnerability arises because when the app is minimized on iOS devices, the App Switcher interface displays a snapshot of the app’s last active screen. If the user had sensitive personal information visible before minimizing, this data remains visible in the App Switcher even after the user logs out. This means an unauthorized person with physical access to the device can view personal data without needing to authenticate or unlock the app. The exposure depends on the last viewed screen, so the extent of data leakage varies. The vulnerability does not affect the app’s backend or data integrity but compromises confidentiality. It requires user interaction (minimizing the app) and physical access to the device but no privileged access or complex exploitation techniques. The issue was addressed and fixed in version 4.71.0 by presumably clearing or obscuring sensitive information before the app transitions to the background or by controlling the snapshot behavior. The CVSS 4.0 score is 1.0, reflecting low severity due to limited impact and exploitation complexity. There are no known active exploits or widespread attacks leveraging this vulnerability. The vulnerability is specific to iOS devices running vulnerable versions of mObywatel and does not affect other platforms or apps.
Potential Impact
For European organizations, particularly those in Poland where mObywatel is widely used as a government-issued digital identity app, this vulnerability poses a privacy risk by exposing personal data to unauthorized individuals with physical access to a user’s iOS device. The impact is primarily on confidentiality, potentially revealing sensitive identity information that could be used for social engineering or identity theft. However, the vulnerability does not compromise data integrity or availability, nor does it allow remote exploitation. The risk is mitigated by the requirement of physical access and user interaction (minimizing the app). Nonetheless, organizations relying on mObywatel for identity verification or citizen services should be aware of this exposure risk and ensure users update to the fixed version. The vulnerability could undermine user trust in digital identity solutions if not addressed promptly. Other European countries using mObywatel or similar apps are less affected due to limited adoption.
Mitigation Recommendations
1. Immediate update of the mObywatel iOS application to version 4.71.0 or later, which contains the fix for this vulnerability. 2. Educate users to fully close or lock the app before leaving their device unattended to prevent unauthorized viewing of sensitive information in the App Switcher. 3. Encourage use of device-level security features such as biometric locks and strong passcodes to reduce the risk of physical access by unauthorized actors. 4. For organizations, implement policies that restrict device sharing and enforce secure device handling practices. 5. Monitor for any unofficial or outdated app versions in use within the organization and mandate updates. 6. Advocate for app developers to implement secure backgrounding practices, such as obscuring or blanking sensitive screens when the app is minimized. 7. Consider additional mobile device management (MDM) controls to enforce app updates and secure app usage policies. 8. Conduct user awareness campaigns highlighting the risks of leaving sensitive apps visible in the App Switcher.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERT-PL
- Date Reserved
- 2025-10-10T12:41:40.283Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6981dfc7f9fa50a62fc15520
Added to database: 2/3/2026, 11:45:11 AM
Last enriched: 2/3/2026, 11:59:29 AM
Last updated: 2/3/2026, 2:28:01 PM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-7760: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ofisimo Web-Based Software Technologies Association Web Package Flora
HighCVE-2025-6397: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ankara Hosting Website Design Website Software
HighCVE-2026-1664: CWE-639 Authorization Bypass Through User-Controlled Key
MediumCVE-2026-1432: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in T-Systems Buroweb
CriticalCVE-2025-8461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Seres Software syWEB
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.