CVE-2025-52926: CWE-223 Omission of Security-relevant Information in spytrap-org spytrap-adb

Low
VulnerabilityCVE-2025-52926cvecve-2025-52926cwe-223
Published: Mon Jun 23 2025 (06/23/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: spytrap-org
Product: spytrap-adb

Description

In scan.rs in spytrap-adb before 0.3.5, matches for known stalkerware are not rendered in the interactive user interface.

AI-Powered Analysis

AILast updated: 06/23/2025, 01:05:06 UTC

Technical Analysis

CVE-2025-52926 is a vulnerability identified in the spytrap-adb tool developed by spytrap-org, specifically affecting versions prior to 0.3.5. The issue resides in the scan.rs component, where matches for known stalkerware are not rendered in the interactive user interface. This omission constitutes a CWE-223 (Omission of Security-relevant Information) vulnerability. Essentially, while the tool may detect stalkerware during its scanning process, it fails to display these detections to the user, thereby withholding critical security information that could alert users to the presence of malicious monitoring software on their devices. The vulnerability has a CVSS 3.1 base score of 2.7, indicating a low severity level. The vector details (AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N) reveal that exploitation requires local access (AV:L), high attack complexity (AC:H), no privileges (PR:N), and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is limited to a slight integrity loss (I:L) with no confidentiality or availability impact. No known exploits are reported in the wild, and no patches have been published yet. The vulnerability primarily affects users relying on spytrap-adb for detecting stalkerware, potentially leading to false assurance of device cleanliness due to the non-disclosure of detected threats in the UI.

Potential Impact

For European organizations, the impact of this vulnerability is relatively limited but non-negligible. Spytrap-adb is a specialized tool used to detect stalkerware, which is often employed in personal or corporate espionage contexts. The failure to display detected stalkerware could lead to undetected monitoring of employees or sensitive devices, potentially compromising privacy and internal security. While the vulnerability does not directly allow attackers to compromise systems or exfiltrate data, it undermines the reliability of a security tool, which could delay detection and response to stalkerware infections. This is particularly relevant for sectors handling sensitive personal data or intellectual property, such as finance, healthcare, and government agencies. However, since exploitation requires local access and user interaction, the risk of widespread automated attacks is low. The low CVSS score reflects the limited direct impact, but the indirect consequences of undetected stalkerware could be more significant in high-security environments.

Mitigation Recommendations

To mitigate this vulnerability, European organizations and users of spytrap-adb should: 1) Upgrade to spytrap-adb version 0.3.5 or later once it is released, as this version is expected to address the issue. 2) Until a patch is available, supplement spytrap-adb scans with alternative stalkerware detection tools that reliably report findings in their interfaces to avoid blind spots. 3) Implement strict access controls to limit local access to devices, reducing the risk of exploitation since local access is required. 4) Educate users about the importance of verifying scan results and encourage manual inspection of logs or scan outputs if accessible, to detect any anomalies not shown in the UI. 5) Monitor for updates from spytrap-org and security advisories to apply patches promptly. 6) Consider integrating device monitoring solutions that provide comprehensive visibility into installed applications and processes, thereby compensating for any gaps in spytrap-adb's reporting.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-06-23T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6858a497179a4edd60b5e028

Added to database: 6/23/2025, 12:49:27 AM

Last enriched: 6/23/2025, 1:05:06 AM

Last updated: 6/23/2025, 5:30:44 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats