CVE-2025-7940: Improper Export of Android Application Components in Genshin Albedo Cat House App
A vulnerability was found in Genshin Albedo Cat House App 1.0.2 on Android. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file AndroidManifest.xml of the component com.house.auscat. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7940 is a medium-severity vulnerability identified in version 1.0.2 of the Genshin Albedo Cat House App on Android. The root cause lies in the improper export of Android application components declared in the AndroidManifest.xml file, specifically within the component identified as com.house.auscat. Improper export means that components such as activities, services, broadcast receivers, or content providers are made accessible to other applications or processes without adequate access controls. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. Since the attack vector requires local access and no user interaction, an attacker with limited privileges could potentially exploit this vulnerability to manipulate app behavior, access sensitive data, or escalate privileges within the app context. The CVSS 4.0 vector indicates low attack complexity and low privileges required, but no user interaction is needed. The vulnerability does not affect system-wide security but compromises the confidentiality, integrity, and availability of the app's internal components to some extent. No patches or fixes have been publicly linked yet, and while the exploit has been disclosed, there are no known exploits in the wild at this time. The vulnerability is specific to the Android platform and the affected app version, limiting its scope to users of this particular app version.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Genshin Albedo Cat House App within their environment. If the app is used on corporate or personal devices that access sensitive organizational data, the improper export of components could allow local attackers or malicious apps to interfere with the app’s functionality or extract data, potentially leading to data leakage or unauthorized actions. Given the local access requirement, the threat is more significant in scenarios where devices are shared, lost, or physically accessed by unauthorized individuals. In sectors with strict data protection regulations such as GDPR, any leakage or unauthorized access to personal or corporate data could lead to compliance issues and reputational damage. However, since the vulnerability does not allow remote exploitation and requires local privileges, the overall risk to large-scale enterprise infrastructure is limited. The medium severity rating reflects moderate risk primarily to device-level security rather than network or system-wide compromise.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should: 1) Avoid installing or using version 1.0.2 of the Genshin Albedo Cat House App until an official patch is released. 2) Restrict physical and local access to devices running the affected app to trusted users only. 3) Employ mobile device management (MDM) solutions to monitor and control app installations and permissions on corporate devices. 4) Review and harden Android app permissions and component exports where possible, especially for apps handling sensitive data. 5) Encourage users to update the app promptly once a patched version is available. 6) Conduct regular security audits of installed apps to identify and remediate similar misconfigurations. 7) Educate users about the risks of local attacks and the importance of device security, including locking devices and avoiding installation of untrusted apps.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7940: Improper Export of Android Application Components in Genshin Albedo Cat House App
Description
A vulnerability was found in Genshin Albedo Cat House App 1.0.2 on Android. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file AndroidManifest.xml of the component com.house.auscat. The manipulation leads to improper export of android application components. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7940 is a medium-severity vulnerability identified in version 1.0.2 of the Genshin Albedo Cat House App on Android. The root cause lies in the improper export of Android application components declared in the AndroidManifest.xml file, specifically within the component identified as com.house.auscat. Improper export means that components such as activities, services, broadcast receivers, or content providers are made accessible to other applications or processes without adequate access controls. This can allow a local attacker—someone with physical or logical access to the device—to interact with these components in unintended ways. Since the attack vector requires local access and no user interaction, an attacker with limited privileges could potentially exploit this vulnerability to manipulate app behavior, access sensitive data, or escalate privileges within the app context. The CVSS 4.0 vector indicates low attack complexity and low privileges required, but no user interaction is needed. The vulnerability does not affect system-wide security but compromises the confidentiality, integrity, and availability of the app's internal components to some extent. No patches or fixes have been publicly linked yet, and while the exploit has been disclosed, there are no known exploits in the wild at this time. The vulnerability is specific to the Android platform and the affected app version, limiting its scope to users of this particular app version.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the usage of the Genshin Albedo Cat House App within their environment. If the app is used on corporate or personal devices that access sensitive organizational data, the improper export of components could allow local attackers or malicious apps to interfere with the app’s functionality or extract data, potentially leading to data leakage or unauthorized actions. Given the local access requirement, the threat is more significant in scenarios where devices are shared, lost, or physically accessed by unauthorized individuals. In sectors with strict data protection regulations such as GDPR, any leakage or unauthorized access to personal or corporate data could lead to compliance issues and reputational damage. However, since the vulnerability does not allow remote exploitation and requires local privileges, the overall risk to large-scale enterprise infrastructure is limited. The medium severity rating reflects moderate risk primarily to device-level security rather than network or system-wide compromise.
Mitigation Recommendations
To mitigate this vulnerability, organizations and users should: 1) Avoid installing or using version 1.0.2 of the Genshin Albedo Cat House App until an official patch is released. 2) Restrict physical and local access to devices running the affected app to trusted users only. 3) Employ mobile device management (MDM) solutions to monitor and control app installations and permissions on corporate devices. 4) Review and harden Android app permissions and component exports where possible, especially for apps handling sensitive data. 5) Encourage users to update the app promptly once a patched version is available. 6) Conduct regular security audits of installed apps to identify and remediate similar misconfigurations. 7) Educate users about the risks of local attacks and the importance of device security, including locking devices and avoiding installation of untrusted apps.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-21T07:31:15.915Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687eae17a83201eaac148f29
Added to database: 7/21/2025, 9:16:07 PM
Last enriched: 7/29/2025, 1:13:08 AM
Last updated: 9/2/2025, 1:15:29 PM
Views: 31
Related Threats
CVE-2025-2694: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM Sterling B2B Integrator
MediumCVE-2025-2667: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM Sterling B2B Integrator
LowCVE-2025-6785: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Tesla Model 3
MediumCVE-2025-41034: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in appRain appRain CMF
HighCVE-2025-41033: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in appRain appRain CMF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.