MobSF is a mobile application security testing tool used. Prior to version 4.4.5, a Stored Cross-site Scripting (XSS) vulnerability in MobSF's Android manifest analysis allows an attacker to execute arbitrary JavaScript in the context of a victim's browser session by uploading a malicious APK. The `android:host` attribute from `<data android:scheme="android_secret_code">` elements is rendered in HTML reports without sanitization, enabling session hijacking and account takeover. Version 4.4.5 fixes the issue.
References
Configurations
History
17 Feb 2026, 20:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/2b08dd050e7685ee2a14fdbb454affab94129eae - Patch | |
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/releases/tag/v4.4.5 - Release Notes | |
| References | () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-8hf7-h89p-3pqj - Vendor Advisory, Exploit | |
| First Time |
Opensecurity mobile Security Framework
Opensecurity |
|
| CPE | cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:* |
27 Jan 2026, 01:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-27 01:16
Updated : 2026-02-17 20:36
NVD link : CVE-2026-24490
Mitre link : CVE-2026-24490
CVE.ORG link : CVE-2026-24490
JSON object : View
Products Affected
opensecurity
- mobile_security_framework
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
