Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65835: n/a

0
Medium
VulnerabilityCVE-2025-65835cvecve-2025-65835
Published: Mon Dec 15 2025 (12/15/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-65835 is a medium severity vulnerability in the Cordova plugin cordova-plugin-x-socialsharing version 6. 0. 4 for Android. The plugin registers an exported broadcast receiver that listens for android. intent. action. SEND intents but fails to validate the presence of the EXTRA_CHOSEN_COMPONENT extra, leading to a NullPointerException and application crash. Because the receiver is exported and lacks permission checks, any local app on the device can send crafted broadcasts to trigger repeated crashes, causing a denial of service at the application level. This vulnerability does not impact confidentiality or integrity but affects availability by crashing the host app. Exploitation requires local access to the device but no special privileges or user interaction.

AI-Powered Analysis

AILast updated: 12/22/2025, 19:28:32 UTC

Technical Analysis

The vulnerability identified as CVE-2025-65835 affects the Cordova plugin cordova-plugin-x-socialsharing version 6.0.4 on Android platforms. This plugin registers an exported broadcast receiver named nl.xservices.plugins.ShareChooserPendingIntent that listens for intents with the action android.intent.action.SEND. The onReceive method of this receiver accesses the Intent.EXTRA_CHOSEN_COMPONENT extra without verifying its presence, leading to a potential null pointer dereference if the extra is missing. Because the broadcast receiver is exported and does not enforce any permission or caller validation, any local application on the device can send a crafted broadcast intent lacking the EXTRA_CHOSEN_COMPONENT extra. This causes the host application embedding the plugin to crash repeatedly due to unhandled NullPointerExceptions, resulting in a denial of service at the application level. The vulnerability is classified under CWE-476 (NULL Pointer Dereference). The CVSS v3.1 score is 6.2, with vector AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires local access but no privileges or user interaction, and impacts availability only. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability primarily affects the availability of apps using this plugin on Android devices, potentially disrupting user experience and business operations relying on these apps.

Potential Impact

For European organizations, the primary impact of CVE-2025-65835 is a local denial of service affecting Android applications that include the vulnerable cordova-plugin-x-socialsharing plugin. This can lead to repeated crashes of critical mobile applications, disrupting business processes, customer interactions, and internal workflows that depend on these apps. While the vulnerability does not compromise confidentiality or integrity, the loss of availability can cause operational delays, reputational damage, and increased support costs. Sectors with high reliance on mobile apps, such as finance, retail, healthcare, and public services, may experience significant disruption. Additionally, organizations with Bring Your Own Device (BYOD) policies may face increased risk as local apps on user devices could be exploited to crash corporate apps. The requirement for local access limits remote exploitation but insider threats or malicious apps installed on devices could trigger the vulnerability. The absence of user interaction requirement means the attack can be automated once local access is obtained.

Mitigation Recommendations

To mitigate CVE-2025-65835, organizations should: 1) Update the cordova-plugin-x-socialsharing plugin to a patched version once available that properly validates the presence of Intent.EXTRA_CHOSEN_COMPONENT before dereferencing it. 2) If no patch is available, implement custom input validation in the app code to check intent extras before processing. 3) Restrict the exported broadcast receiver by setting android:exported="false" or applying permission checks to prevent unauthorized apps from sending crafted broadcasts. 4) Employ mobile application management (MAM) solutions to control which apps can be installed and restrict potentially malicious local apps. 5) Educate users about the risks of installing untrusted apps that could exploit local broadcast receivers. 6) Monitor app crash logs and device behavior for signs of repeated crashes that may indicate exploitation attempts. 7) For developers, follow secure coding practices to validate all intent extras and avoid null pointer dereferences. 8) Consider implementing runtime application self-protection (RASP) to detect and mitigate abnormal intent handling. These steps go beyond generic advice by focusing on broadcast receiver exposure and local app controls specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69405ac4d9bcdf3f3dfb23c4

Added to database: 12/15/2025, 7:00:20 PM

Last enriched: 12/22/2025, 7:28:32 PM

Last updated: 2/7/2026, 6:32:08 AM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats