CVE-2026-33545

MobSF is a mobile application security testing tool used. Prior to version 4.4.6, MobSF's `read_sqlite()` function in `mobsf/MobSF/utils.py` (lines 542-566) uses Python string formatting (`%`) to construct SQL queries with table names read from a SQLite database's `sqlite_master` table. When a security analyst uses MobSF to analyze a malicious mobile application containing a crafted SQLite database, attacker-controlled table names are interpolated directly into SQL queries without parameterization or escaping. This allows an attacker to cause denial of service and achieve SQL injection. Version 4.4.6 patches the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*

History

03 Apr 2026, 20:28

Type Values Removed Values Added
References () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/6f8a43c1b78d21cfbd7186aaafa7f622d990e0f1 - () https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/6f8a43c1b78d21cfbd7186aaafa7f622d990e0f1 - Patch
References () https://github.com/MobSF/Mobile-Security-Framework-MobSF/releases/tag/v4.4.6 - () https://github.com/MobSF/Mobile-Security-Framework-MobSF/releases/tag/v4.4.6 - Release Notes
References () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-hqjr-43r5-9q58 - () https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-hqjr-43r5-9q58 - Exploit, Vendor Advisory
First Time Opensecurity mobile Security Framework
Opensecurity
CPE cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*

30 Mar 2026, 13:26

Type Values Removed Values Added
Summary
  • (es) MobSF es una herramienta utilizada para pruebas de seguridad de aplicaciones móviles. Antes de la versión 4.4.6, la función `read_sqlite()` de MobSF en `mobsf/MobSF/utils.py` (líneas 542-566) utiliza el formato de cadena de Python ('%') para construir consultas SQL con nombres de tabla leídos de la tabla `sqlite_master` de una base de datos SQLite. Cuando un analista de seguridad utiliza MobSF para analizar una aplicación móvil maliciosa que contiene una base de datos SQLite manipulada, los nombres de tabla controlados por el atacante se interpolan directamente en las consultas SQL sin parametrización ni escape. Esto permite a un atacante causar denegación de servicio y lograr inyección SQL. La versión 4.4.6 corrige el problema.

26 Mar 2026, 21:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-26 21:17

Updated : 2026-04-03 20:28


NVD link : CVE-2026-33545

Mitre link : CVE-2026-33545

CVE.ORG link : CVE-2026-33545


JSON object : View

Products Affected

opensecurity

  • mobile_security_framework
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')