{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-8745","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-08-08T08:58:52.773Z","datePublished":"2025-08-09T05:02:05.495Z","dateUpdated":"2025-08-11T18:33:45.620Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-08-09T05:02:05.495Z"},"title":"Weee RICEPO App com.ricepo.app AndroidManifest.xml improper export of android application components","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-926","lang":"en","description":"Improper Export of Android Application Components"}]}],"affected":[{"vendor":"Weee","product":"RICEPO App","versions":[{"version":"6.17.77","status":"affected"}],"modules":["com.ricepo.app"]}],"descriptions":[{"lang":"en","value":"A vulnerability, which was classified as problematic, has been found in Weee RICEPO App 6.17.77 on Android. This issue affects some unknown processing of the file AndroidManifest.xml of the component com.ricepo.app. The manipulation leads to improper export of android application components. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."},{"lang":"de","value":"Eine Schwachstelle wurde in Weee RICEPO App 6.17.77 für Android entdeckt. Sie wurde als problematisch eingestuft. Es geht hierbei um eine nicht näher spezifizierte Funktion der Datei AndroidManifest.xml der Komponente com.ricepo.app. Durch Beeinflussen mit unbekannten Daten kann eine improper export of android application components-Schwachstelle ausgenutzt werden. Umgesetzt werden muss der Angriff lokal. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-08-08T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-08-08T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-08-08T11:04:09.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"fxizenta (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.319241","name":"VDB-319241 | Weee RICEPO App com.ricepo.app AndroidManifest.xml improper export of android application components","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.319241","name":"VDB-319241 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.623581","name":"Submit #623581 | Ricepo LLC RICEPO by Weee(com.ricepo.app) 6.17.77 Task Hijacking","tags":["third-party-advisory"]},{"url":"https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md","tags":["related"]},{"url":"https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md#steps-to-reproduce","tags":["exploit"]}]},"adp":[{"references":[{"url":"https://github.com/KMov-g/androidapps/blob/main/com.ricepo.app.md","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-08-11T18:11:52.847613Z","id":"CVE-2025-8745","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-08-11T18:33:45.620Z"}}]}}