Home

Description

A vulnerability was determined in Dialogue App up to 4.3.2 on Android. The affected element is an unknown function of the file file res/raw/config.json of the component ca.diagram.dialogue. Executing a manipulation of the argument SEGMENT_WRITE_KEY can lead to use of hard-coded cryptographic key . The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-03 | Updated 2026-04-03 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
1.7AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Use of Hard-coded Cryptographic Key

Key Management Error

Timeline

2026-04-02:VulDB entry created
2026-04-03:Advisory disclosed
2026-04-03:VulDB entry last update

Credits

fxizenta (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/355043 (VDB-355043 | Dialogue App ca.diagram.dialogue config.json hard-coded key) vdb-entry technical-description

vuldb.com/vuln/355043/cti (VDB-355043 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/781761 (Submit #781761 | Dialogue Dialogue(ca.diagram.dialogue) 4.3.2 Segment Write Key Exposure) third-party-advisory

www.notion.so/...3f97fb802fb5f0d2c9d179dcf6?source=copy_link exploit

cve.org (CVE-2026-5455)

nvd.nist.gov (CVE-2026-5455)

Download JSON