Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26427: Elevation of privilege in Google Android

0
Medium
VulnerabilityCVE-2025-26427cvecve-2025-26427
Published: Thu Sep 04 2025 (09/04/2025, 17:11:51 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: Android

Description

In multiple locations, there is a possible Android/data access due to a path traversal error. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 01:15:17 UTC

Technical Analysis

CVE-2025-26427 is a vulnerability identified in Google Android versions 13 and 14 involving a path traversal error that allows unauthorized access to the Android/data directory in multiple locations. This flaw stems from improper validation of file paths, categorized under CWE-24, which enables an attacker with local access to bypass intended access controls. The vulnerability can be exploited to escalate privileges locally without requiring additional execution privileges, meaning an attacker who already has limited access can leverage this flaw to gain higher privileges. However, exploitation requires user interaction, such as opening a malicious file or app, which limits remote or automated exploitation. The vulnerability affects confidentiality and integrity by potentially exposing or modifying sensitive data stored in Android/data, but it does not impact system availability. The CVSS v3.1 base score is 4.4 (medium), reflecting the need for local access and user interaction, and the absence of known active exploits in the wild reduces immediate risk. No official patches or mitigation links have been published yet, indicating that affected users and organizations should remain vigilant and apply updates once available. This vulnerability highlights the importance of secure path validation in mobile operating systems to prevent unauthorized data access and privilege escalation.

Potential Impact

The primary impact of CVE-2025-26427 is a local elevation of privilege on Android devices running versions 13 and 14. Attackers with local access and the ability to trick users into interaction could exploit the path traversal flaw to access or modify sensitive data within the Android/data directory, potentially compromising user privacy and application data integrity. While the vulnerability does not allow remote exploitation or denial of service, the ability to escalate privileges locally can facilitate further attacks, such as installing persistent malware or accessing restricted system components. Organizations relying on Android devices for sensitive communications or data storage could face data leakage or unauthorized data modification risks. The requirement for user interaction and local access limits the scope but does not eliminate risk, especially in environments where users may install untrusted apps or open suspicious files. The absence of known exploits in the wild suggests limited current impact, but the widespread use of Android 13 and 14 globally means the vulnerability could be leveraged in targeted attacks or by advanced threat actors once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-26427, organizations and users should: 1) Restrict installation of applications from untrusted or unknown sources to reduce the risk of malicious apps exploiting the vulnerability. 2) Educate users about the risks of interacting with unverified files or links that could trigger the exploit. 3) Employ mobile device management (MDM) solutions to enforce security policies and control app permissions, limiting access to sensitive directories like Android/data. 4) Monitor for official security updates from Google and apply patches promptly once released. 5) Use runtime application self-protection (RASP) or endpoint detection and response (EDR) tools capable of detecting suspicious local privilege escalation attempts. 6) Implement least privilege principles on devices, ensuring apps have only necessary permissions. 7) Conduct regular security audits and penetration testing on mobile environments to identify and remediate similar path traversal or privilege escalation issues proactively. These targeted measures go beyond generic advice by focusing on user behavior, app control, and proactive monitoring specific to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
google_android
Date Reserved
2025-02-10T18:16:18.439Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68b9d3be88499799243bc170

Added to database: 9/4/2025, 6:00:30 PM

Last enriched: 2/27/2026, 1:15:17 AM

Last updated: 3/25/2026, 1:33:06 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses