CVE-2025-14517

5.3 MEDIUM

📋 TL;DR

This vulnerability in Yalantis uCrop library allows improper export of Android application components, potentially enabling local attackers to spoof intents or perform SSRF attacks. It affects Android applications using uCrop 2.2.11 for image cropping functionality. The vulnerability requires local access to the device for exploitation.

💻 Affected Systems

Products:
  • Yalantis uCrop Android library
Versions: 2.2.11
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android apps that integrate uCrop library. Vulnerability is in UCropActivity component export configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker could execute arbitrary activities, access sensitive app data, or perform server-side request forgery to internal network resources.

🟠

Likely Case

Malicious app on same device could intercept or manipulate image cropping operations, potentially accessing or modifying user images.

🟢

If Mitigated

With proper Android permissions and sandboxing, impact limited to data within the vulnerable app's scope.

🌐 Internet-Facing: LOW - requires local device access, not remotely exploitable.
🏢 Internal Only: MEDIUM - local exploitation possible but requires malicious app installation or physical access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local app installation or physical device access. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Consider removing or replacing uCrop library with alternative solution.

🔧 Temporary Workarounds

Manifest configuration fix

all

Modify AndroidManifest.xml to properly configure UCropActivity export attribute

Edit AndroidManifest.xml: Set android:exported="false" for UCropActivity if not needed externally, or implement proper intent filters and permissions

🧯 If You Can't Patch

  • Implement runtime permission checks and input validation for UCropActivity intents
  • Use Android's permission system to restrict which apps can interact with UCropActivity

🔍 How to Verify

Check if Vulnerable:

Check if app uses uCrop 2.2.11 and inspect AndroidManifest.xml for UCropActivity with improper export configuration

Check Version:

Check build.gradle dependencies for 'com.yalantis:ucrop:2.2.11'

Verify Fix Applied:

Verify UCropActivity has proper android:exported attribute and intent filters in AndroidManifest.xml

📡 Detection & Monitoring

Log Indicators:

  • Unexpected intent calls to UCropActivity
  • Permission denial logs for UCropActivity access attempts

Network Indicators:

  • Unexpected outbound requests from app following image cropping operations

SIEM Query:

Android logs: activity UCropActivity with suspicious intent parameters or from untrusted source packages

🔗 References

📤 Share & Export