The mobile application is configured to allow clear text traffic to all domains and communicates with an API server over HTTP. As a result, an adversary located "upstream" can intercept the traffic, inspect its contents, and modify the requests in transit. TThis may result in a total compromise of the user's account if the attacker intercepts a request with active authentication tokens or cracks the MD5 hash sent on login.
References
| Link | Resource |
|---|---|
| https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-clear-text-traffic-enabled-md | Third Party Advisory |
| https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Mobile-Application/Clear-Text-Traffic-Enabled.md | Third Party Advisory |
Configurations
History
30 Dec 2025, 19:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://gist.github.com/dead1nfluence/4dffc239b4a460f41a03345fd8e5feb5#file-clear-text-traffic-enabled-md - Third Party Advisory | |
| References | () https://github.com/dead1nfluence/Meatmeet-Pro-Vulnerabilities/blob/main/Mobile-Application/Clear-Text-Traffic-Enabled.md - Third Party Advisory | |
| First Time |
Meatmeet meatmeet
Meatmeet |
|
| CPE | cpe:2.3:a:meatmeet:meatmeet:1.1.2.0:*:*:*:pro:android:*:* |
11 Dec 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-319 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
10 Dec 2025, 21:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 21:16
Updated : 2025-12-30 19:09
NVD link : CVE-2025-65827
Mitre link : CVE-2025-65827
CVE.ORG link : CVE-2025-65827
JSON object : View
Products Affected
meatmeet
- meatmeet
CWE
CWE-319
Cleartext Transmission of Sensitive Information
