CVE-2025-8513

5.3 MEDIUM

📋 TL;DR

This vulnerability in Caixin News App for Android allows improper export of application components via AndroidManifest.xml. Attackers with local access to the device can potentially access sensitive app components. Only Android users of Caixin News App version 8.0.1 are affected.

💻 Affected Systems

Products:
  • Caixin News App
Versions: 8.0.1
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version 8.0.1 of Caixin News App. Requires local access to device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains unauthorized access to sensitive app components, potentially leading to data theft or privilege escalation within the app context.

🟠

Likely Case

Limited information disclosure or unauthorized access to non-critical app components by malicious apps already installed on the device.

🟢

If Mitigated

No impact if proper Android security controls are in place and users don't install untrusted apps.

🌐 Internet-Facing: LOW - Requires local access to device, not directly exploitable over internet.
🏢 Internal Only: MEDIUM - Requires local access, but could be exploited by malicious apps or users with physical access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit details publicly disclosed on GitHub. Requires local access and potentially another malicious app on device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UNKNOWN

Vendor Advisory: NONE

Restart Required: No

Instructions:

No official patch available. Vendor did not respond to disclosure. Consider workarounds or alternative apps.

🔧 Temporary Workarounds

Uninstall vulnerable app

android

Remove Caixin News App 8.0.1 from affected devices

adb uninstall com.caixin.news

Restrict app permissions

android

Limit app permissions in Android settings to minimum required

🧯 If You Can't Patch

  • Isolate device from sensitive networks and data
  • Implement mobile device management (MDM) controls to restrict app installations

🔍 How to Verify

Check if Vulnerable:

Check app version in Google Play Store or device app settings. If version is 8.0.1, device is vulnerable.

Check Version:

adb shell dumpsys package com.caixin.news | grep versionName

Verify Fix Applied:

Update to newer version if available from vendor, or verify app is uninstalled.

📡 Detection & Monitoring

Log Indicators:

  • Android logs showing unauthorized component access attempts
  • App crash logs related to exported components

Network Indicators:

  • None - local vulnerability only

SIEM Query:

app:"Caixin News" AND version:"8.0.1" AND event_type:"security_violation"

🔗 References

📤 Share & Export