Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-8hf7-h89p-3pqj | MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 27 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobsf
Mobsf mobile Security Framework |
|
| Vendors & Products |
Mobsf
Mobsf mobile Security Framework |
Tue, 27 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The `android:host` attribute from `<data android:scheme="android_secret_code">` elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover. Version 4.4.5 fixes the issue. | |
| Title | MobSF has Stored XSS via Manifest Analysis - Dialer Code Host Field | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-27T14:43:35.345Z
Reserved: 2026-01-23T00:38:20.549Z
Link: CVE-2026-24490
Updated: 2026-01-27T14:43:31.128Z
Status : Awaiting Analysis
Published: 2026-01-27T01:16:02.610
Modified: 2026-01-27T14:59:34.073
Link: CVE-2026-24490
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:03:01Z
Github GHSA