Skip to main content

CVE-2025-7892: Improper Export of Android Application Components in IDnow App

Medium
VulnerabilityCVE-2025-7892cvecve-2025-7892
Published: Sun Jul 20 2025 (07/20/2025, 13:14:05 UTC)
Source: CVE Database V5
Product: IDnow App

Description

A vulnerability classified as problematic has been found in IDnow App up to 9.6.0 on Android. This affects an unknown part of the file AndroidManifest.xml of the component de.idnow. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/20/2025, 13:46:06 UTC

Technical Analysis

CVE-2025-7892 is a medium-severity vulnerability affecting the IDnow Android application versions 9.0 through 9.6.0. The vulnerability arises from improper exportation of Android application components declared in the AndroidManifest.xml file, specifically within the component identified as de.idnow. Improperly exported components can be accessed by other applications or processes on the device, potentially allowing unauthorized local attackers to interact with these components. This can lead to unauthorized information disclosure, manipulation of app behavior, or privilege escalation within the app context. The attack requires local access to the device, meaning the attacker must have some level of access to the victim’s device, such as through physical access or via another malicious app installed on the device. No user interaction or elevated privileges beyond local access are required, and the vulnerability does not affect system confidentiality, integrity, or availability at a critical level but does pose a risk of limited data exposure or unauthorized operations within the app. The vendor was notified but has not responded or issued a patch, and no known exploits are currently active in the wild. The CVSS 4.0 vector (4.8 base score) reflects low attack complexity and privileges required, with no user interaction needed, but limited scope and impact. This vulnerability is particularly relevant for environments where the IDnow app is used for identity verification or sensitive transactions on Android devices, as improper component export can undermine app security assumptions.

Potential Impact

For European organizations, especially those relying on IDnow for identity verification, onboarding, or compliance processes, this vulnerability could lead to unauthorized access or manipulation of identity verification workflows if an attacker gains local access to a device. This could result in fraudulent identity attestations or leakage of sensitive user data handled by the app. While the vulnerability requires local access and does not enable remote exploitation, the risk is non-negligible in environments where devices may be shared, lost, or compromised by malware. Organizations in sectors such as finance, telecommunications, and government that use IDnow for KYC (Know Your Customer) or eIDAS-compliant identity verification may face increased risk of fraud or regulatory non-compliance if this vulnerability is exploited. The lack of vendor response and patch availability increases the window of exposure. However, the medium severity and local access requirement limit the scale of impact compared to remote or network-exploitable vulnerabilities.

Mitigation Recommendations

Organizations should implement strict device management policies to prevent unauthorized local access to devices running the IDnow app, including enforcing device encryption, strong authentication, and mobile device management (MDM) solutions that restrict installation of untrusted apps. Users should be advised to avoid installing unknown or untrusted applications that could exploit this vulnerability locally. Network segmentation and endpoint protection can help detect and prevent lateral movement or malware that might leverage this vulnerability. Since no patch is currently available, organizations should monitor vendor communications for updates and consider alternative identity verification solutions if risk tolerance is low. Additionally, security teams can perform manual audits of the app’s exported components using tools like APK Analyzer or Android Studio to identify and block or restrict access to improperly exported components via custom security policies or app hardening techniques where feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-19T10:55:08.419Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687cefa2a83201eaac029405

Added to database: 7/20/2025, 1:31:14 PM

Last enriched: 7/20/2025, 1:46:06 PM

Last updated: 7/20/2025, 1:46:06 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats