CVE-2025-24804
Python vulnerability analysis and mitigation

Overview

Mobile Security Framework (MobSF) version 4.3.0 and earlier contains a vulnerability in the iOS bundle identifier validation mechanism. The vulnerability was discovered and disclosed on February 5, 2025, affecting the automated mobile application pen-testing and security assessment framework that supports Android, iOS, and Windows platforms (NVD, GitHub Advisory).

Technical details

The vulnerability stems from insufficient validation of iOS bundle identifiers. According to Apple's documentation, bundle IDs must only contain alphanumeric characters (A-Z, a-z, 0-9), hyphens (-), and periods (.). However, the application's URL routing mechanism used a less restrictive regex pattern that allowed special characters in the bundle identifier. The vulnerability has been assigned a CVSS v4.0 base score of 4.8 (Medium) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N (GitHub Advisory).

Impact

When an attacker modifies the CFBundleIdentifier value in the Info.plist file to include special characters, the application encounters parsing errors. This results in a 500 error response and makes the affected pages inaccessible. The only remediation is to manually remove the malicious application from the system (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in MobSF version 4.3.1. Users are advised to upgrade to this version or later. There are no known workarounds for this vulnerability (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management