Home

Description

The vulnerability allows any application installed on the device to read SMS/MMS data and metadata from the system-provided Telephony provider without permission, user interaction, or consent. The user is also not notified that SMS data is being accessed. This could lead to sensitive information disclosure and could effectively break the security provided by SMS-based Multi-Factor Authentication (MFA) checks. The root cause is a combination of missing permissions for write operations in several content providers (com.android.providers.telephony.PushMessageProvider, com.android.providers.telephony.PushShopProvider, com.android.providers.telephony.ServiceNumberProvider), and a blind SQL injection in the update method of those providers.

PUBLISHED Reserved 2025-09-09 | Published 2025-09-23 | Updated 2025-09-23 | Assigner rapid7




HIGH: 8.2CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-862 Missing Authorization

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unknown

11.* (semver)
unaffected

12.* (semver)
affected

13.* (semver)
affected

14.* (semver)
affected

15.*
affected

Credits

Calum Hutton finder

References

www.rapid7.com/...hony-provider-permission-bypass-not-fixed/ exploit

assets.contentstack.io/...15d43a6b588/CVE-2025-10184_PoC.zip exploit

www.rapid7.com/...hony-provider-permission-bypass-not-fixed/ third-party-advisory technical-description

assets.contentstack.io/...15d43a6b588/CVE-2025-10184_PoC.zip exploit

cve.org (CVE-2025-10184)

nvd.nist.gov (CVE-2025-10184)

Download JSON