CVE-2025-24803
📋 TL;DR
CVE-2025-24803 is a stored cross-site scripting (XSS) vulnerability in Mobile Security Framework (MobSF) that allows attackers to inject malicious scripts by manipulating bundle identifiers in iOS app analysis. This affects all MobSF users performing dynamic analysis of iOS applications. The vulnerability exists because the dynamic_analysis.html file doesn't sanitize bundle ID values received from Corellium.
💻 Affected Systems
- Mobile Security Framework (MobSF)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could execute arbitrary JavaScript in the context of MobSF users, potentially stealing session cookies, performing actions as authenticated users, or delivering malware.
Likely Case
Attackers could deface the MobSF interface, steal session tokens to gain unauthorized access, or redirect users to malicious sites.
If Mitigated
With proper input validation and output encoding, the attack would be prevented entirely with no impact.
🎯 Exploit Status
Exploitation requires the attacker to have control over the iOS app bundle ID being analyzed, which typically means they need to modify the Info.plist file of an app before submitting it to MobSF.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.3.1
Vendor Advisory: https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-cxqq-w3x5-7ph3
Restart Required: Yes
Instructions:
1. Backup your current MobSF installation and data. 2. Update MobSF to version 4.3.1 using pip: 'pip install --upgrade mobsf==4.3.1'. 3. Restart the MobSF service. 4. Verify the update was successful by checking the version.
🔧 Temporary Workarounds
Disable iOS dynamic analysis
allTemporarily disable dynamic analysis of iOS applications until patching is possible
Modify MobSF configuration to disable iOS dynamic analysis features
🧯 If You Can't Patch
- Implement a web application firewall (WAF) with XSS protection rules
- Restrict access to MobSF to trusted users only and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check if MobSF version is below 4.3.1 and if iOS dynamic analysis is enabled
Check Version:
mobsf --version or check the about page in the MobSF web interface
Verify Fix Applied:
Verify MobSF version is 4.3.1 or higher and test iOS app analysis with special characters in bundle ID
📡 Detection & Monitoring
Log Indicators:
- Unusual characters in bundle ID fields
- JavaScript execution errors in dynamic analysis logs
Network Indicators:
- Suspicious outbound connections from MobSF server after iOS analysis
SIEM Query:
source="mobsf" AND ("CFBundleIdentifier" OR "bundle" OR "dynamic_analysis") AND ("<script>" OR "javascript:" OR special characters)
🔗 References
- https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier
- https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83
- https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-cxqq-w3x5-7ph3