We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49846

wire-ios accidentally logs message contents



Description

wire-ios is an iOS client for the Wire secure messaging application. From Wire iOS 3.111.1 to before 3.124.1, messages that were visible in the view port have been logged to the iOS system logs in clear text. Wire application logs created and managed by the application itself were not affected, especially not the logs users can export and send to Wire support. The iOS logs can only be accessed if someone had (physical) access to the underlying unlocked device. The issue manifested itself by calling canOpenUrl() and passing an invalid URL object. When iOS then performs the check and fails, it logs the contents to the system log. This is not documented behaviour. Wire released an emergency fix with version 3.124.1. As a workaround, users can reset their iOS device to remove the offending logs. Since Wire cannot access or modify iOS system logs, there's no other workaround other than a reset.

Reserved 2025-06-11 | Published 2025-07-03 | Updated 2025-07-03 | Assigner GitHub_M


MEDIUM: 4.1CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-117: Improper Output Neutralization for Logs

CWE-532: Insertion of Sensitive Information into Log File

Product status

>= 3.111.1, < 3.124.1
affected

References

github.com/...re-ios/security/advisories/GHSA-pj5p-96xx-hc7m

github.com/...ommit/0cff0e4298d87c2c56de07f3fb18d3e8e5a68fa3

github.com/wireapp/wire-ios/releases/tag/appstore/3.124.1

cve.org (CVE-2025-49846)

nvd.nist.gov (CVE-2025-49846)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49846

Support options

Helpdesk Chat, Email, Knowledgebase