Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9671: Improper Export of Android Application Components in UAB Paytend App

0
Medium
VulnerabilityCVE-2025-9671cvecve-2025-9671
Published: Fri Aug 29 2025 (08/29/2025, 19:32:07 UTC)
Source: CVE Database V5
Vendor/Project: UAB
Product: Paytend App

Description

A weakness has been identified in UAB Paytend App up to 2.1.9 on Android. This impacts an unknown function of the file AndroidManifest.xml of the component com.passport.cash. Executing manipulation can lead to improper export of android application components. The attack needs to be launched locally. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/29/2025, 20:02:44 UTC

Technical Analysis

CVE-2025-9671 is a medium-severity vulnerability affecting the UAB Paytend Android application versions 2.1.0 through 2.1.9. The vulnerability arises from improper export of Android application components declared in the AndroidManifest.xml file, specifically related to the component com.passport.cash. Improper export means that certain app components (such as activities, services, or broadcast receivers) are made accessible to other apps or processes without adequate access controls. This can allow a local attacker—someone with physical or local access to the device—to manipulate these components, potentially leading to unauthorized access or actions within the app context. The attack vector requires local access and does not require user interaction, but does require at least limited privileges (PR:L). The CVSS 4.0 vector indicates low attack complexity and partial impact on confidentiality, integrity, and availability. The vendor was contacted but did not respond, and no patch links are currently available. Although the exploit code has been publicly released, there are no known exploits in the wild yet. This vulnerability is significant because financial or payment apps like Paytend often handle sensitive user data and transactions, so improper component exposure could lead to data leakage or unauthorized transaction manipulation if exploited.

Potential Impact

For European organizations, especially those relying on UAB Paytend for payment processing or financial transactions, this vulnerability could lead to unauthorized local access to sensitive financial information or manipulation of app behavior. While remote exploitation is not possible, insider threats or attackers with physical access to devices could leverage this flaw to compromise confidentiality and integrity of payment data. This could result in financial fraud, data breaches, or loss of customer trust. Organizations in sectors such as banking, retail, or any service using Paytend for payments should be particularly cautious. The lack of vendor response and absence of patches increases the risk exposure. Additionally, the vulnerability could be exploited in corporate environments where employees use Paytend on company-issued Android devices, potentially leading to lateral movement or privilege escalation within internal networks.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement several practical mitigations: 1) Restrict physical and local access to devices running vulnerable versions of Paytend through strong device management policies and endpoint security controls. 2) Employ Mobile Device Management (MDM) solutions to enforce app usage policies, restrict installation of unauthorized apps, and monitor for suspicious local activity. 3) Encourage users to update to newer versions of Paytend if and when patches become available; meanwhile, consider alternative payment apps with better security posture. 4) Conduct regular security audits and penetration testing focusing on local privilege escalation and app component exposure. 5) Use Android security features such as app sandboxing, permission management, and disabling debugging options to reduce attack surface. 6) Educate users about risks of local attacks and the importance of device security. 7) Monitor for any emerging exploit activity related to this CVE and be prepared to respond swiftly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T10:11:37.007Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b203e4ad5a09ad007a8a7c

Added to database: 8/29/2025, 7:47:48 PM

Last enriched: 8/29/2025, 8:02:44 PM

Last updated: 10/14/2025, 6:39:54 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats