Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9695: Improper Export of Android Application Components in GalleryVault Gallery Vault App

0
Medium
VulnerabilityCVE-2025-9695cvecve-2025-9695
Published: Sat Aug 30 2025 (08/30/2025, 15:32:06 UTC)
Source: CVE Database V5
Vendor/Project: GalleryVault
Product: Gallery Vault App

Description

A vulnerability was identified in GalleryVault Gallery Vault App up to 4.5.2 on Android. Affected by this issue is some unknown functionality of the file AndroidManifest.xml of the component com.thinkyeah.galleryvault. The manipulation leads to improper export of android application components. The attack can only be performed from a local environment. The exploit is publicly available and might be used.

AI-Powered Analysis

AILast updated: 09/07/2025, 00:40:17 UTC

Technical Analysis

CVE-2025-9695 is a medium-severity vulnerability affecting the GalleryVault Gallery Vault App on Android versions up to 4.5.2. The root cause lies in the improper export of Android application components due to misconfiguration in the AndroidManifest.xml file, specifically within the component identified as com.thinkyeah.galleryvault. This misconfiguration allows certain app components to be exported unintentionally, making them accessible to other local applications or processes on the same device. The vulnerability requires local access to the device, meaning an attacker must have physical or local control over the Android environment to exploit it. No user interaction or elevated privileges beyond limited permissions are necessary, and the attack vector is local (AV:L). The vulnerability impacts confidentiality, integrity, and availability to a limited extent, as it could allow unauthorized access or manipulation of app components, potentially leading to data leakage or unauthorized operations within the app context. The CVSS 4.0 base score is 4.8, reflecting a medium severity level. Although no known exploits are currently observed in the wild, a public exploit exists, increasing the risk of exploitation by local attackers. The vulnerability does not require authentication or user interaction, but the scope is limited to local environments, reducing the overall attack surface. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for users to monitor updates from the vendor.

Potential Impact

For European organizations, the impact of CVE-2025-9695 is primarily relevant to those using the Gallery Vault App on Android devices, particularly if the app is employed to secure sensitive images or documents. The improper export of app components could lead to unauthorized local access to protected data or app functionalities, potentially compromising confidentiality and integrity of sensitive information. Organizations relying on mobile device security for compliance with data protection regulations such as GDPR may face increased risk if sensitive personal data is exposed through this vulnerability. While the attack requires local access, insider threats or scenarios involving lost or stolen devices could be exploited. The vulnerability could also be leveraged as a foothold for further local privilege escalation or lateral movement within a compromised device. However, the limited scope and local attack vector reduce the likelihood of widespread remote exploitation, making the threat more relevant in environments with less stringent physical device controls or where devices are shared among multiple users.

Mitigation Recommendations

To mitigate CVE-2025-9695, European organizations should take several specific steps beyond generic advice: 1) Immediately audit the use of Gallery Vault App on corporate or personal devices used for work purposes and assess the necessity of the app in the environment. 2) Restrict physical and local access to devices, enforcing strong device lock mechanisms such as biometric authentication or strong PINs to prevent unauthorized local access. 3) Monitor for updates from the GalleryVault vendor and apply patches promptly once available. 4) If possible, configure Android application permissions and component exports manually by inspecting the AndroidManifest.xml or using mobile device management (MDM) solutions to restrict exported components. 5) Educate users about the risks of installing apps from untrusted sources and the importance of device security to prevent local exploitation. 6) Consider alternative secure vault applications with better security track records if the Gallery Vault App is critical but unpatched. 7) Implement endpoint detection and response (EDR) tools capable of detecting suspicious local activity on mobile devices to identify potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-29T11:27:56.710Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68b31d3dad5a09ad008b270e

Added to database: 8/30/2025, 3:48:13 PM

Last enriched: 9/7/2025, 12:40:17 AM

Last updated: 10/16/2025, 1:44:49 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats