CVE-2026-24490: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MobSF Mobile-Security-Framework-MobSF
CVE-2026-24490 is a high-severity Stored Cross-site Scripting (XSS) vulnerability in MobSF Mobile-Security-Framework versions prior to 4. 4. 5. It arises from improper sanitization of the android:host attribute in Android manifest analysis reports, allowing attackers to inject malicious JavaScript by uploading crafted APK files. Exploitation can lead to session hijacking and account takeover within the victim's browser session. The vulnerability requires authenticated access and user interaction to upload the malicious APK, but it affects the confidentiality and integrity of user sessions with no impact on availability. MobSF 4. 4. 5 addresses this issue by properly neutralizing input. European organizations using vulnerable MobSF versions for mobile app security testing are at risk, especially those in sectors with high mobile app security demands.
AI Analysis
Technical Summary
CVE-2026-24490 is a Stored Cross-site Scripting (XSS) vulnerability identified in the Mobile-Security-Framework-MobSF, a widely used mobile application security testing tool. The vulnerability exists in versions prior to 4.4.5 and specifically affects the Android manifest analysis feature. MobSF generates HTML reports that include data extracted from APK files, including the android:host attribute within <data android:scheme="android_secret_code"> elements. Due to improper neutralization of this input, maliciously crafted APKs can embed JavaScript code within the android:host attribute, which is then rendered unsanitized in the HTML report. When a victim views this report in a browser, the embedded script executes in the context of the user's session, enabling attackers to hijack sessions or perform account takeover attacks. The vulnerability requires an attacker to have authenticated access to upload a malicious APK and for the victim to interact with the generated report. The CVSS 3.1 score of 8.1 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N) indicates network attack vector, low attack complexity, high privileges required, user interaction needed, and a scope change with high confidentiality and integrity impacts but no availability impact. No known exploits are reported in the wild yet. The vendor fixed the issue in MobSF version 4.4.5 by implementing proper input sanitization and neutralization to prevent script injection in reports.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions within MobSF environments. Organizations that rely on MobSF for mobile app security testing, particularly those handling sensitive or regulated mobile applications, may face session hijacking or account takeover if malicious APKs are uploaded and reports viewed by authorized personnel. This could lead to unauthorized access to sensitive security testing data, manipulation of testing results, or further lateral movement within the network. The requirement for authenticated upload and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple users or less stringent access controls. The vulnerability could undermine trust in security testing processes and potentially expose intellectual property or compliance-related information. Given the growing importance of mobile security in sectors such as finance, healthcare, and government across Europe, the impact could be material if exploited.
Mitigation Recommendations
1. Upgrade MobSF to version 4.4.5 or later immediately to ensure the vulnerability is patched. 2. Restrict APK upload permissions strictly to trusted and trained personnel to reduce the risk of malicious uploads. 3. Implement additional input validation and sanitization in any custom report generation or processing workflows involving MobSF outputs. 4. Monitor and audit upload activities and report access logs to detect any anomalous behavior indicative of exploitation attempts. 5. Educate users about the risks of interacting with untrusted reports and enforce policies to verify report sources before viewing. 6. Consider isolating MobSF instances in segmented network zones with limited access to reduce potential lateral movement in case of compromise. 7. Regularly review and update security testing tools and processes to incorporate vendor patches and security best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-24490: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in MobSF Mobile-Security-Framework-MobSF
Description
CVE-2026-24490 is a high-severity Stored Cross-site Scripting (XSS) vulnerability in MobSF Mobile-Security-Framework versions prior to 4. 4. 5. It arises from improper sanitization of the android:host attribute in Android manifest analysis reports, allowing attackers to inject malicious JavaScript by uploading crafted APK files. Exploitation can lead to session hijacking and account takeover within the victim's browser session. The vulnerability requires authenticated access and user interaction to upload the malicious APK, but it affects the confidentiality and integrity of user sessions with no impact on availability. MobSF 4. 4. 5 addresses this issue by properly neutralizing input. European organizations using vulnerable MobSF versions for mobile app security testing are at risk, especially those in sectors with high mobile app security demands.
AI-Powered Analysis
Technical Analysis
CVE-2026-24490 is a Stored Cross-site Scripting (XSS) vulnerability identified in the Mobile-Security-Framework-MobSF, a widely used mobile application security testing tool. The vulnerability exists in versions prior to 4.4.5 and specifically affects the Android manifest analysis feature. MobSF generates HTML reports that include data extracted from APK files, including the android:host attribute within <data android:scheme="android_secret_code"> elements. Due to improper neutralization of this input, maliciously crafted APKs can embed JavaScript code within the android:host attribute, which is then rendered unsanitized in the HTML report. When a victim views this report in a browser, the embedded script executes in the context of the user's session, enabling attackers to hijack sessions or perform account takeover attacks. The vulnerability requires an attacker to have authenticated access to upload a malicious APK and for the victim to interact with the generated report. The CVSS 3.1 score of 8.1 (AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N) indicates network attack vector, low attack complexity, high privileges required, user interaction needed, and a scope change with high confidentiality and integrity impacts but no availability impact. No known exploits are reported in the wild yet. The vendor fixed the issue in MobSF version 4.4.5 by implementing proper input sanitization and neutralization to prevent script injection in reports.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of user sessions within MobSF environments. Organizations that rely on MobSF for mobile app security testing, particularly those handling sensitive or regulated mobile applications, may face session hijacking or account takeover if malicious APKs are uploaded and reports viewed by authorized personnel. This could lead to unauthorized access to sensitive security testing data, manipulation of testing results, or further lateral movement within the network. The requirement for authenticated upload and user interaction limits the attack surface but does not eliminate risk, especially in environments with multiple users or less stringent access controls. The vulnerability could undermine trust in security testing processes and potentially expose intellectual property or compliance-related information. Given the growing importance of mobile security in sectors such as finance, healthcare, and government across Europe, the impact could be material if exploited.
Mitigation Recommendations
1. Upgrade MobSF to version 4.4.5 or later immediately to ensure the vulnerability is patched. 2. Restrict APK upload permissions strictly to trusted and trained personnel to reduce the risk of malicious uploads. 3. Implement additional input validation and sanitization in any custom report generation or processing workflows involving MobSF outputs. 4. Monitor and audit upload activities and report access logs to detect any anomalous behavior indicative of exploitation attempts. 5. Educate users about the risks of interacting with untrusted reports and enforce policies to verify report sources before viewing. 6. Consider isolating MobSF instances in segmented network zones with limited access to reduce potential lateral movement in case of compromise. 7. Regularly review and update security testing tools and processes to incorporate vendor patches and security best practices.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-23T00:38:20.549Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69780bf04623b1157cc7aacb
Added to database: 1/27/2026, 12:50:56 AM
Last enriched: 2/3/2026, 8:45:14 AM
Last updated: 2/7/2026, 8:56:44 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.