Skip to main content

CVE-2025-5154: Cleartext Storage in a File or on Disk in PhonePe App

Medium
VulnerabilityCVE-2025-5154cvecve-2025-5154
Published: Sun May 25 2025 (05/25/2025, 18:31:04 UTC)
Source: CVE
Vendor/Project: n/a
Product: PhonePe App

Description

A vulnerability, which was classified as problematic, was found in PhonePe App 25.03.21.0 on Android. Affected is an unknown function of the file /data/data/com.phonepe.app/databases/ of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/09/2025, 13:28:36 UTC

Technical Analysis

CVE-2025-5154 is a medium-severity vulnerability identified in the PhonePe App version 25.03.21.0 on Android devices. The vulnerability involves the cleartext storage of sensitive data within the app's SQLite database files located at /data/data/com.phonepe.app/databases/. Specifically, an unknown function within the app improperly stores data on disk without encryption or adequate protection, leading to potential exposure of sensitive information. Exploitation requires local access with high privileges (PR:H) on the device, meaning an attacker must already have significant control or physical access to the device to leverage this vulnerability. No user interaction is required for exploitation, and the attack complexity is low. The vulnerability does not affect confidentiality, integrity, or availability broadly but does pose a risk of data leakage due to cleartext storage. The CVSS 4.0 vector indicates no network attack vector (AV:L), no privileges required beyond high privilege on the device, and no user interaction. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for mitigation strategies. The vulnerability primarily affects the confidentiality of data stored locally on the device, potentially exposing user financial or personal information if the device is compromised or accessed by unauthorized parties.

Potential Impact

For European organizations, especially those with employees or customers using the PhonePe app on Android devices, this vulnerability could lead to local data leakage if devices are lost, stolen, or compromised by malware with elevated privileges. Although the vulnerability requires local high privilege access, it could be leveraged in targeted attacks or insider threat scenarios to extract sensitive financial or personal data stored by the app. This risk is particularly relevant for organizations handling sensitive financial transactions or personal data under GDPR regulations, as exposure could lead to compliance violations and reputational damage. Additionally, if employees use the app on corporate devices, the vulnerability could serve as a pivot point for attackers to gain further access or intelligence. However, the impact is limited by the requirement for local high privilege access and the absence of remote exploitation vectors, reducing the likelihood of widespread automated attacks across European organizations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Ensure that all Android devices running the PhonePe app are secured with strong device-level protections such as full-disk encryption, strong authentication, and device management policies to prevent unauthorized local access. 2) Restrict installation of apps and limit privilege escalation on devices to reduce the risk of attackers gaining high privilege access. 3) Monitor devices for signs of compromise or rooting that could enable exploitation of this vulnerability. 4) Encourage users to update the PhonePe app promptly once a patch is released, and maintain communication with the vendor for security updates. 5) Implement mobile device management (MDM) solutions to enforce security policies and remotely wipe devices if lost or stolen. 6) Educate users on the risks of installing untrusted apps or granting excessive permissions that could facilitate privilege escalation. 7) Consider isolating financial apps on dedicated devices or sandboxed environments to minimize exposure. These measures go beyond generic advice by focusing on preventing the prerequisite conditions (local high privilege access) necessary for exploitation and protecting sensitive data at the device level.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-24T22:19:52.467Z
Cisa Enriched
false
Cvss Version
4.0
State
PUBLISHED

Threat ID: 683363650acd01a249282258

Added to database: 5/25/2025, 6:37:25 PM

Last enriched: 7/9/2025, 1:28:36 PM

Last updated: 8/18/2025, 8:55:31 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats