CVE-2025-9134

A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it."
Configurations

Configuration 1 (hide)

cpe:2.3:a:aftership:aftership_package_tracker:*:*:*:*:*:android:*:*

History

12 Sep 2025, 15:38

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md - () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md - Exploit, Third Party Advisory
References () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce - () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.320514 - () https://vuldb.com/?ctiid.320514 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.320514 - () https://vuldb.com/?id.320514 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.615253 - () https://vuldb.com/?submit.615253 - Third Party Advisory, VDB Entry
First Time Aftership aftership Package Tracker
Aftership
CPE cpe:2.3:a:aftership:aftership_package_tracker:*:*:*:*:*:android:*:*

19 Aug 2025, 14:15

Type Values Removed Values Added
References () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md - () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md -
References () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce - () https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce -

19 Aug 2025, 13:42

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad de seguridad en la aplicación AfterShip Package Tracker (hasta la versión 5.24.1) para Android. El elemento afectado es una función desconocida del archivo AndroidManifest.xml del componente com.aftership.AfterShip. Esta manipulación provoca la exportación incorrecta de componentes de la aplicación Android. El ataque debe ejecutarse localmente. Se ha hecho público el exploit y puede que sea utilizado. Se contactó al proveedor con antelación para informarle sobre esta divulgación, quien respondió: «Tras revisar su informe, hemos confirmado que esta vulnerabilidad existe y estamos trabajando activamente para solucionarla».

19 Aug 2025, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 11:15

Updated : 2025-09-12 15:38


NVD link : CVE-2025-9134

Mitre link : CVE-2025-9134

CVE.ORG link : CVE-2025-9134


JSON object : View

Products Affected

aftership

  • aftership_package_tracker
CWE
CWE-926

Improper Export of Android Application Components

NVD-CWE-noinfo