CVE-2025-9134
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
12/09/2025
Description
A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it."
Impact
Base Score 4.0
4.80
Severity 4.0
MEDIUM
Base Score 3.x
5.30
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:aftership:aftership_package_tracker:*:*:*:*:*:android:*:* | 5.24.1 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md
- https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce
- https://vuldb.com/?ctiid_320514=
- https://vuldb.com/?id_320514=
- https://vuldb.com/?submit_615253=
- https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md
- https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce



