CVE-2025-14317

N/A Unknown

📋 TL;DR

This vulnerability allows authenticated attackers in the Crazy Bubble Tea mobile app to access other users' personal information by enumerating loyaltyGuestId parameters. The server fails to verify proper authorization before returning sensitive data. All users of vulnerable app versions are affected.

💻 Affected Systems

Products:
  • Crazy Bubble Tea mobile application
Versions: Android versions before 915, iOS versions before 7.4.1
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the mobile application, not web or backend systems directly.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass data breach exposing personal information of all app users, potentially including names, contact details, and loyalty program data.

🟠

Likely Case

Targeted data harvesting where attackers systematically enumerate user IDs to collect personal information for identity theft or phishing campaigns.

🟢

If Mitigated

Limited data exposure if rate limiting or monitoring detects enumeration attempts early.

🌐 Internet-Facing: HIGH - Mobile apps are internet-facing and accessible globally to authenticated users.
🏢 Internal Only: LOW - This is a client-server vulnerability, not an internal network issue.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation is simple parameter manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android: 915, iOS: 7.4.1

Vendor Advisory: https://crazybubble.pl/aplikacja-crazy-bubble/

Restart Required: Yes

Instructions:

1. Open Google Play Store or Apple App Store. 2. Search for 'Crazy Bubble Tea'. 3. Update to latest version (Android 915+ or iOS 7.4.1+). 4. Restart the application.

🔧 Temporary Workarounds

Disable app or restrict access

all

Uninstall vulnerable app versions or restrict network access to prevent exploitation.

🧯 If You Can't Patch

  • Implement server-side authorization checks for all user data requests
  • Add rate limiting and monitoring for unusual loyaltyGuestId enumeration patterns

🔍 How to Verify

Check if Vulnerable:

Check app version in settings: Android < 915 or iOS < 7.4.1 indicates vulnerability.

Check Version:

Android: Settings → Apps → Crazy Bubble Tea → App info. iOS: Settings → General → iPhone Storage → Crazy Bubble Tea.

Verify Fix Applied:

Confirm app version is Android ≥ 915 or iOS ≥ 7.4.1 after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of loyaltyGuestId parameter requests
  • Multiple failed authorization attempts for user data

Network Indicators:

  • Rapid sequential requests with incrementing loyaltyGuestId values
  • Unusual data volume from single authenticated sessions

SIEM Query:

source=app_logs AND (loyaltyGuestId AND (rate>10/min OR pattern=sequential))

🔗 References

📤 Share & Export