Home

Description

MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The `android:host` attribute from `<data android:scheme="android_secret_code">` elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover. Version 4.4.5 fixes the issue.

PUBLISHED Reserved 2026-01-23 | Published 2026-01-27 | Updated 2026-01-27 | Assigner GitHub_M




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 4.4.5
affected

References

github.com/...-MobSF/security/advisories/GHSA-8hf7-h89p-3pqj

github.com/...ommit/2b08dd050e7685ee2a14fdbb454affab94129eae

github.com/...e-Security-Framework-MobSF/releases/tag/v4.4.5

cve.org (CVE-2026-24490)

nvd.nist.gov (CVE-2026-24490)

Download JSON