CVE-2025-5154: Cleartext Storage in a File or on Disk in PhonePe App
A vulnerability, which was classified as problematic, was found in PhonePe App 25.03.21.0 on Android. Affected is an unknown function of the file /data/data/com.phonepe.app/databases/ of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-5154 is a medium-severity vulnerability identified in the PhonePe App version 25.03.21.0 on Android devices. The vulnerability involves the cleartext storage of sensitive data within the app's SQLite database files located at /data/data/com.phonepe.app/databases/. Specifically, an unknown function within the app improperly stores data on disk without encryption or adequate protection, leading to potential exposure of sensitive information. Exploitation requires local access with high privileges (PR:H) on the device, meaning an attacker must already have significant control or physical access to the device to leverage this vulnerability. No user interaction is required for exploitation, and the attack complexity is low. The vulnerability does not affect confidentiality, integrity, or availability broadly but does pose a risk of data leakage due to cleartext storage. The CVSS 4.0 vector indicates no network attack vector (AV:L), no privileges required beyond high privilege on the device, and no user interaction. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for mitigation strategies. The vulnerability primarily affects the confidentiality of data stored locally on the device, potentially exposing user financial or personal information if the device is compromised or accessed by unauthorized parties.
Potential Impact
For European organizations, especially those with employees or customers using the PhonePe app on Android devices, this vulnerability could lead to local data leakage if devices are lost, stolen, or compromised by malware with elevated privileges. Although the vulnerability requires local high privilege access, it could be leveraged in targeted attacks or insider threat scenarios to extract sensitive financial or personal data stored by the app. This risk is particularly relevant for organizations handling sensitive financial transactions or personal data under GDPR regulations, as exposure could lead to compliance violations and reputational damage. Additionally, if employees use the app on corporate devices, the vulnerability could serve as a pivot point for attackers to gain further access or intelligence. However, the impact is limited by the requirement for local high privilege access and the absence of remote exploitation vectors, reducing the likelihood of widespread automated attacks across European organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Ensure that all Android devices running the PhonePe app are secured with strong device-level protections such as full-disk encryption, strong authentication, and device management policies to prevent unauthorized local access. 2) Restrict installation of apps and limit privilege escalation on devices to reduce the risk of attackers gaining high privilege access. 3) Monitor devices for signs of compromise or rooting that could enable exploitation of this vulnerability. 4) Encourage users to update the PhonePe app promptly once a patch is released, and maintain communication with the vendor for security updates. 5) Implement mobile device management (MDM) solutions to enforce security policies and remotely wipe devices if lost or stolen. 6) Educate users on the risks of installing untrusted apps or granting excessive permissions that could facilitate privilege escalation. 7) Consider isolating financial apps on dedicated devices or sandboxed environments to minimize exposure. These measures go beyond generic advice by focusing on preventing the prerequisite conditions (local high privilege access) necessary for exploitation and protecting sensitive data at the device level.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands
CVE-2025-5154: Cleartext Storage in a File or on Disk in PhonePe App
Description
A vulnerability, which was classified as problematic, was found in PhonePe App 25.03.21.0 on Android. Affected is an unknown function of the file /data/data/com.phonepe.app/databases/ of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-5154 is a medium-severity vulnerability identified in the PhonePe App version 25.03.21.0 on Android devices. The vulnerability involves the cleartext storage of sensitive data within the app's SQLite database files located at /data/data/com.phonepe.app/databases/. Specifically, an unknown function within the app improperly stores data on disk without encryption or adequate protection, leading to potential exposure of sensitive information. Exploitation requires local access with high privileges (PR:H) on the device, meaning an attacker must already have significant control or physical access to the device to leverage this vulnerability. No user interaction is required for exploitation, and the attack complexity is low. The vulnerability does not affect confidentiality, integrity, or availability broadly but does pose a risk of data leakage due to cleartext storage. The CVSS 4.0 vector indicates no network attack vector (AV:L), no privileges required beyond high privilege on the device, and no user interaction. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of future exploitation. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for mitigation strategies. The vulnerability primarily affects the confidentiality of data stored locally on the device, potentially exposing user financial or personal information if the device is compromised or accessed by unauthorized parties.
Potential Impact
For European organizations, especially those with employees or customers using the PhonePe app on Android devices, this vulnerability could lead to local data leakage if devices are lost, stolen, or compromised by malware with elevated privileges. Although the vulnerability requires local high privilege access, it could be leveraged in targeted attacks or insider threat scenarios to extract sensitive financial or personal data stored by the app. This risk is particularly relevant for organizations handling sensitive financial transactions or personal data under GDPR regulations, as exposure could lead to compliance violations and reputational damage. Additionally, if employees use the app on corporate devices, the vulnerability could serve as a pivot point for attackers to gain further access or intelligence. However, the impact is limited by the requirement for local high privilege access and the absence of remote exploitation vectors, reducing the likelihood of widespread automated attacks across European organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should: 1) Ensure that all Android devices running the PhonePe app are secured with strong device-level protections such as full-disk encryption, strong authentication, and device management policies to prevent unauthorized local access. 2) Restrict installation of apps and limit privilege escalation on devices to reduce the risk of attackers gaining high privilege access. 3) Monitor devices for signs of compromise or rooting that could enable exploitation of this vulnerability. 4) Encourage users to update the PhonePe app promptly once a patch is released, and maintain communication with the vendor for security updates. 5) Implement mobile device management (MDM) solutions to enforce security policies and remotely wipe devices if lost or stolen. 6) Educate users on the risks of installing untrusted apps or granting excessive permissions that could facilitate privilege escalation. 7) Consider isolating financial apps on dedicated devices or sandboxed environments to minimize exposure. These measures go beyond generic advice by focusing on preventing the prerequisite conditions (local high privilege access) necessary for exploitation and protecting sensitive data at the device level.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-05-24T22:19:52.467Z
- Cisa Enriched
- false
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683363650acd01a249282258
Added to database: 5/25/2025, 6:37:25 PM
Last enriched: 7/9/2025, 1:28:36 PM
Last updated: 8/18/2025, 8:55:31 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.