Skip to main content

CVE-2025-8745: Improper Export of Android Application Components in Weee RICEPO App

Medium
VulnerabilityCVE-2025-8745cvecve-2025-8745
Published: Sat Aug 09 2025 (08/09/2025, 05:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Weee
Product: RICEPO App

Description

A vulnerability, which was classified as problematic, has been found in Weee RICEPO App 6.17.77 on Android. This issue affects some unknown processing of the file AndroidManifest.xml of the component com.ricepo.app. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/17/2025, 01:05:37 UTC

Technical Analysis

CVE-2025-8745 is a medium-severity vulnerability identified in version 6.17.77 of the Weee RICEPO Android application. The root cause lies in improper export settings of Android application components declared within the AndroidManifest.xml file, specifically related to the component com.ricepo.app. Improper export means that components intended to be private or restricted may be accessible to other applications or processes on the same device. This vulnerability requires local access to the device (attack vector: local) and low privileges (PR:L), meaning an attacker must have some level of access to the device but does not need elevated permissions. No user interaction is required to exploit this issue, and the attack complexity is low. The vulnerability impacts confidentiality, integrity, and availability at a low level, as indicated by the CVSS vector. The vendor was notified but did not respond, and no patch or fix has been published yet. Although the exploit has been publicly disclosed, there are no known exploits actively used in the wild at this time. The vulnerability could allow a local attacker to interact with exported components improperly, potentially leading to unauthorized access to app functionality or data leakage within the device context. Since the vulnerability is tied to the AndroidManifest.xml configuration, it is a design/implementation flaw in the app's component exposure policy rather than a code execution flaw. This limits the scope of impact to the device and app environment rather than remote exploitation or widespread network impact.

Potential Impact

For European organizations, the impact of CVE-2025-8745 depends largely on the usage of the Weee RICEPO app within their workforce or customer base. If the app is used for business or operational purposes, the improper export of components could lead to unauthorized local access to sensitive app functions or data, potentially exposing confidential information or allowing unauthorized actions within the app. This could undermine data integrity and availability of app services on employee devices. Given the local attack vector, the threat is more relevant in scenarios where devices are shared, lost, or compromised by insiders or attackers with physical or local access. The medium severity indicates moderate risk, but the lack of vendor response and patch increases the window of exposure. Organizations in sectors with strict data protection regulations (e.g., GDPR) must consider the risk of data leakage or unauthorized access through this vulnerability. Additionally, if the app integrates with enterprise systems or handles sensitive transactions, the vulnerability could be leveraged as a foothold for further local attacks or lateral movement within a device.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first assess the presence and usage of the Weee RICEPO app version 6.17.77 on employee and corporate devices. Since no patch is currently available, immediate mitigation steps include: 1) Restricting installation or usage of the affected app version on corporate-managed devices through mobile device management (MDM) policies. 2) Educating users about the risks of local device compromise and enforcing strong device access controls such as PINs, biometrics, and encryption to prevent unauthorized local access. 3) Monitoring devices for suspicious local activity or unauthorized app interactions that could exploit exported components. 4) Encouraging the vendor to provide a patch or update and tracking any future releases addressing this issue. 5) If feasible, using app hardening or sandboxing solutions to limit inter-app communication and component exposure. 6) Reviewing AndroidManifest.xml export settings in custom or in-house apps to prevent similar misconfigurations. These steps go beyond generic advice by focusing on device-level controls, user awareness, and vendor engagement specific to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-08T08:58:52.773Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6896d9fbad5a09ad00091c1d

Added to database: 8/9/2025, 5:17:47 AM

Last enriched: 8/17/2025, 1:05:37 AM

Last updated: 9/15/2025, 3:25:38 AM

Views: 37

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats