CVE-2025-65835: n/a
The Cordova plugin cordova-plugin-x-socialsharing (SocialSharing-PhoneGap-Plugin) for Android 6.0.4, registers an exported broadcast receiver nl.xservices.plugins.ShareChooserPendingIntent with an android.intent.action.SEND intent filter. The onReceive implementation accesses Intent.EXTRA_CHOSEN_COMPONENT without checking for null. If a broadcast is sent with extras present but without EXTRA_CHOSEN_COMPONENT, the code dereferences a null value and throws a NullPointerException. Because the receiver is exported and performs no permission or caller validation, any local application on the device can send crafted ACTION_SEND broadcasts to this component and repeatedly crash the host application, resulting in a local, unauthenticated application-level denial of service for any app that includes the plugin.
AI Analysis
Technical Summary
CVE-2025-65835 identifies a vulnerability in the Cordova plugin cordova-plugin-x-socialsharing version 6.0.4 for Android platforms. This plugin registers an exported broadcast receiver named nl.xservices.plugins.ShareChooserPendingIntent that listens for intents with the action android.intent.action.SEND. The vulnerability arises because the onReceive method accesses the Intent.EXTRA_CHOSEN_COMPONENT extra without verifying its presence, leading to a NullPointerException if the extra is missing. Since the broadcast receiver is exported and lacks any permission checks or caller validation, any local application on the device can send a crafted ACTION_SEND broadcast intent without the required extra, causing the host application to crash repeatedly. This results in a local denial of service (DoS) at the application level, disrupting the availability of any app embedding this plugin. The flaw does not require user interaction or authentication, but exploitation is limited to local apps on the device, reducing the attack scope. No patches or updates are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights the risks of improperly secured exported components in Android apps, especially those relying on third-party plugins. Developers should validate intent extras and restrict exported broadcast receivers to trusted callers to mitigate such risks.
Potential Impact
For European organizations, the primary impact of CVE-2025-65835 is the potential for local denial of service on Android applications that incorporate the vulnerable cordova-plugin-x-socialsharing version 6.0.4. This can degrade user experience, disrupt business operations relying on mobile apps, and potentially cause reputational damage if critical apps become unstable or unusable. Although the attack requires a malicious local app, the risk is heightened in environments where users may install untrusted apps or where devices are shared. Industries with mobile workforce or customer-facing apps using Cordova plugins—such as retail, finance, and public services—may face operational interruptions. The vulnerability does not compromise data confidentiality or integrity but affects availability, which can be critical for service continuity. The absence of remote exploitation limits the threat to device-level attacks, but insider threats or compromised devices could exploit this flaw. European organizations should assess their mobile app portfolios for usage of this plugin version and prioritize remediation to maintain app stability and user trust.
Mitigation Recommendations
To mitigate CVE-2025-65835, organizations and developers should: 1) Update the cordova-plugin-x-socialsharing to a patched version once available that properly validates the presence of Intent.EXTRA_CHOSEN_COMPONENT before dereferencing. 2) If no patch is available, implement custom validation in the app code to check for null extras in the broadcast receiver and handle such cases gracefully to prevent crashes. 3) Restrict the broadcast receiver by removing the exported attribute or adding permission checks to ensure only trusted apps can send intents. 4) Employ application hardening techniques such as runtime checks and exception handling to prevent unhandled NullPointerExceptions. 5) Conduct thorough testing of broadcast receivers for robustness against malformed intents. 6) Educate users and administrators to avoid installing untrusted local apps that could exploit this vulnerability. 7) Monitor app crash logs and user reports for signs of exploitation. 8) Consider using alternative sharing plugins with better security practices if timely patching is not feasible. These steps go beyond generic advice by focusing on intent validation, receiver exposure restriction, and proactive monitoring specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-65835: n/a
Description
The Cordova plugin cordova-plugin-x-socialsharing (SocialSharing-PhoneGap-Plugin) for Android 6.0.4, registers an exported broadcast receiver nl.xservices.plugins.ShareChooserPendingIntent with an android.intent.action.SEND intent filter. The onReceive implementation accesses Intent.EXTRA_CHOSEN_COMPONENT without checking for null. If a broadcast is sent with extras present but without EXTRA_CHOSEN_COMPONENT, the code dereferences a null value and throws a NullPointerException. Because the receiver is exported and performs no permission or caller validation, any local application on the device can send crafted ACTION_SEND broadcasts to this component and repeatedly crash the host application, resulting in a local, unauthenticated application-level denial of service for any app that includes the plugin.
AI-Powered Analysis
Technical Analysis
CVE-2025-65835 identifies a vulnerability in the Cordova plugin cordova-plugin-x-socialsharing version 6.0.4 for Android platforms. This plugin registers an exported broadcast receiver named nl.xservices.plugins.ShareChooserPendingIntent that listens for intents with the action android.intent.action.SEND. The vulnerability arises because the onReceive method accesses the Intent.EXTRA_CHOSEN_COMPONENT extra without verifying its presence, leading to a NullPointerException if the extra is missing. Since the broadcast receiver is exported and lacks any permission checks or caller validation, any local application on the device can send a crafted ACTION_SEND broadcast intent without the required extra, causing the host application to crash repeatedly. This results in a local denial of service (DoS) at the application level, disrupting the availability of any app embedding this plugin. The flaw does not require user interaction or authentication, but exploitation is limited to local apps on the device, reducing the attack scope. No patches or updates are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights the risks of improperly secured exported components in Android apps, especially those relying on third-party plugins. Developers should validate intent extras and restrict exported broadcast receivers to trusted callers to mitigate such risks.
Potential Impact
For European organizations, the primary impact of CVE-2025-65835 is the potential for local denial of service on Android applications that incorporate the vulnerable cordova-plugin-x-socialsharing version 6.0.4. This can degrade user experience, disrupt business operations relying on mobile apps, and potentially cause reputational damage if critical apps become unstable or unusable. Although the attack requires a malicious local app, the risk is heightened in environments where users may install untrusted apps or where devices are shared. Industries with mobile workforce or customer-facing apps using Cordova plugins—such as retail, finance, and public services—may face operational interruptions. The vulnerability does not compromise data confidentiality or integrity but affects availability, which can be critical for service continuity. The absence of remote exploitation limits the threat to device-level attacks, but insider threats or compromised devices could exploit this flaw. European organizations should assess their mobile app portfolios for usage of this plugin version and prioritize remediation to maintain app stability and user trust.
Mitigation Recommendations
To mitigate CVE-2025-65835, organizations and developers should: 1) Update the cordova-plugin-x-socialsharing to a patched version once available that properly validates the presence of Intent.EXTRA_CHOSEN_COMPONENT before dereferencing. 2) If no patch is available, implement custom validation in the app code to check for null extras in the broadcast receiver and handle such cases gracefully to prevent crashes. 3) Restrict the broadcast receiver by removing the exported attribute or adding permission checks to ensure only trusted apps can send intents. 4) Employ application hardening techniques such as runtime checks and exception handling to prevent unhandled NullPointerExceptions. 5) Conduct thorough testing of broadcast receivers for robustness against malformed intents. 6) Educate users and administrators to avoid installing untrusted local apps that could exploit this vulnerability. 7) Monitor app crash logs and user reports for signs of exploitation. 8) Consider using alternative sharing plugins with better security practices if timely patching is not feasible. These steps go beyond generic advice by focusing on intent validation, receiver exposure restriction, and proactive monitoring specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-11-18T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69405ac4d9bcdf3f3dfb23c4
Added to database: 12/15/2025, 7:00:20 PM
Last enriched: 12/15/2025, 7:16:09 PM
Last updated: 12/16/2025, 3:53:06 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14749: Improper Access Controls in Ningyuanda TC155
MediumCVE-2025-14748: Improper Access Controls in Ningyuanda TC155
MediumCVE-2025-62849: CWE-89 in QNAP Systems Inc. QTS
MediumCVE-2025-62848: CWE-476 in QNAP Systems Inc. QTS
HighCVE-2025-62847: CWE-88 in QNAP Systems Inc. QTS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.