CVE-2025-46335: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MobSF Mobile-Security-Framework-MobSF
Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. A Stored Cross-Site Scripting (XSS) vulnerability has been identified in MobSF versions up to and including 4.3.2. The vulnerability arises from improper sanitization of user-supplied SVG files during the Android APK analysis workflow. Version 4.3.3 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-46335 is a high-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Mobile Security Framework (MobSF) up to version 4.3.2. MobSF is a widely used open-source security research platform designed for analyzing mobile applications across Android, iOS, and Windows Mobile environments. The vulnerability stems from improper sanitization of user-supplied SVG files during the Android APK analysis workflow. Specifically, when MobSF processes SVG files embedded within Android APKs, it fails to neutralize malicious scripts embedded in these SVGs, allowing attackers to inject and store malicious JavaScript code. This stored XSS can then be executed in the context of the MobSF web interface when the malicious SVG is rendered, potentially leading to unauthorized actions such as session hijacking, data theft, or further exploitation of the MobSF server environment. The vulnerability requires no authentication but does require user interaction (e.g., an analyst loading or analyzing a malicious APK containing the crafted SVG). The CVSS 4.0 score of 8.6 reflects the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality and integrity, with limited impact on availability. The issue was addressed in MobSF version 4.3.3, which implements proper sanitization of SVG inputs to prevent script injection. No known exploits are currently reported in the wild, but given MobSF's role in security research and mobile app analysis, exploitation could have significant consequences if weaponized.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on MobSF for mobile application security assessments, development, or research. Successful exploitation could lead to unauthorized access to sensitive analysis data, including proprietary mobile app code, security findings, or credentials stored within MobSF. This could compromise the confidentiality and integrity of security assessments and potentially expose organizations to further attacks. Additionally, since MobSF is often used in security teams and by developers, a compromised MobSF instance could serve as a pivot point for attackers to infiltrate internal networks or exfiltrate sensitive intellectual property. The vulnerability's exploitation could disrupt mobile app security workflows, delay vulnerability remediation, and undermine trust in security tools. Given the increasing regulatory focus in Europe on data protection (e.g., GDPR), any data leakage resulting from this vulnerability could also lead to compliance violations and financial penalties.
Mitigation Recommendations
European organizations using MobSF should immediately upgrade to version 4.3.3 or later to remediate this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization policies for all files processed by MobSF, especially SVGs and other potentially scriptable formats. Running MobSF in isolated, segmented environments with limited network exposure can reduce the risk of lateral movement if compromised. Employing web application firewalls (WAFs) to detect and block malicious payloads targeting the MobSF interface can add an additional layer of defense. Regularly auditing and monitoring MobSF logs for unusual activity or unexpected file uploads can help detect exploitation attempts early. Training security analysts on the risks of processing untrusted APKs and enforcing strict operational security procedures when using MobSF will further reduce exposure. Finally, organizations should consider integrating automated vulnerability scanning and sandboxing of APKs prior to analysis in MobSF to minimize the risk of malicious payloads reaching the analysis platform.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain
CVE-2025-46335: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MobSF Mobile-Security-Framework-MobSF
Description
Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. A Stored Cross-Site Scripting (XSS) vulnerability has been identified in MobSF versions up to and including 4.3.2. The vulnerability arises from improper sanitization of user-supplied SVG files during the Android APK analysis workflow. Version 4.3.3 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-46335 is a high-severity Stored Cross-Site Scripting (XSS) vulnerability affecting the Mobile Security Framework (MobSF) up to version 4.3.2. MobSF is a widely used open-source security research platform designed for analyzing mobile applications across Android, iOS, and Windows Mobile environments. The vulnerability stems from improper sanitization of user-supplied SVG files during the Android APK analysis workflow. Specifically, when MobSF processes SVG files embedded within Android APKs, it fails to neutralize malicious scripts embedded in these SVGs, allowing attackers to inject and store malicious JavaScript code. This stored XSS can then be executed in the context of the MobSF web interface when the malicious SVG is rendered, potentially leading to unauthorized actions such as session hijacking, data theft, or further exploitation of the MobSF server environment. The vulnerability requires no authentication but does require user interaction (e.g., an analyst loading or analyzing a malicious APK containing the crafted SVG). The CVSS 4.0 score of 8.6 reflects the network attack vector, low attack complexity, no privileges required, but user interaction needed, and high impact on confidentiality and integrity, with limited impact on availability. The issue was addressed in MobSF version 4.3.3, which implements proper sanitization of SVG inputs to prevent script injection. No known exploits are currently reported in the wild, but given MobSF's role in security research and mobile app analysis, exploitation could have significant consequences if weaponized.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on MobSF for mobile application security assessments, development, or research. Successful exploitation could lead to unauthorized access to sensitive analysis data, including proprietary mobile app code, security findings, or credentials stored within MobSF. This could compromise the confidentiality and integrity of security assessments and potentially expose organizations to further attacks. Additionally, since MobSF is often used in security teams and by developers, a compromised MobSF instance could serve as a pivot point for attackers to infiltrate internal networks or exfiltrate sensitive intellectual property. The vulnerability's exploitation could disrupt mobile app security workflows, delay vulnerability remediation, and undermine trust in security tools. Given the increasing regulatory focus in Europe on data protection (e.g., GDPR), any data leakage resulting from this vulnerability could also lead to compliance violations and financial penalties.
Mitigation Recommendations
European organizations using MobSF should immediately upgrade to version 4.3.3 or later to remediate this vulnerability. Beyond patching, organizations should implement strict input validation and sanitization policies for all files processed by MobSF, especially SVGs and other potentially scriptable formats. Running MobSF in isolated, segmented environments with limited network exposure can reduce the risk of lateral movement if compromised. Employing web application firewalls (WAFs) to detect and block malicious payloads targeting the MobSF interface can add an additional layer of defense. Regularly auditing and monitoring MobSF logs for unusual activity or unexpected file uploads can help detect exploitation attempts early. Training security analysts on the risks of processing untrusted APKs and enforcing strict operational security procedures when using MobSF will further reduce exposure. Finally, organizations should consider integrating automated vulnerability scanning and sandboxing of APKs prior to analysis in MobSF to minimize the risk of malicious payloads reaching the analysis platform.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-22T22:41:54.911Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdaf30
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/5/2025, 7:42:04 PM
Last updated: 1/7/2026, 6:08:27 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.