CVE-2025-45156

5.3 MEDIUM

📋 TL;DR

Splashin iOS v2.0 fails to properly enforce server-side interval restrictions for location updates for free-tier users, allowing them to potentially bypass intended usage limits. This affects all free-tier users of the Splashin iOS application version 2.0.

💻 Affected Systems

Products:
  • Splashin iOS
Versions: v2.0
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects free-tier users; paid tiers may have different validation mechanisms.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Free-tier users could send location updates at higher frequencies than intended, potentially overwhelming server resources or gaining functionality reserved for paid tiers.

🟠

Likely Case

Free users bypass usage restrictions to get more frequent location updates than their tier allows, impacting service fairness and potentially causing minor performance issues.

🟢

If Mitigated

With proper server-side validation, location update intervals are enforced according to user tier, maintaining service integrity.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a free-tier user account and basic API manipulation skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://splashin.com

Restart Required: No

Instructions:

1. Check vendor advisory at http://splashin.com for updates. 2. Update to patched version when available. 3. No client restart should be needed for server-side fixes.

🔧 Temporary Workarounds

Server-side rate limiting

all

Implement server-side validation of location update intervals based on user tier

Temporary free-tier restrictions

all

Apply stricter temporary limits to free-tier location updates until patch is available

🧯 If You Can't Patch

  • Implement server-side validation middleware to check location update intervals against user tier permissions
  • Monitor for abnormal location update patterns from free-tier accounts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Test if free-tier user can send location updates more frequently than documented limits via API calls

Check Version:

Check app version in iOS Settings > General > About > Version

Verify Fix Applied:

Verify server properly rejects location updates from free-tier users that exceed interval restrictions

📡 Detection & Monitoring

Log Indicators:

  • Multiple location update requests from free-tier users within short timeframes
  • Location update intervals shorter than documented free-tier limits

Network Indicators:

  • Unusually frequent location API calls from free-tier user agents
  • Location update payloads with manipulated timestamps

SIEM Query:

source="splashin_api" user_tier="free" location_update_count > 10 within 1h

🔗 References

📤 Share & Export