Moderate severityNVD Advisory· Published Mar 31, 2025· Updated Mar 31, 2025
Mobile Security Framework (MobSF) has a SSRF Vulnerability fix bypass on assetlinks_check with DNS Rebinding
CVE-2025-31116
Description
Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mobsfPyPI | < 4.3.2 | 4.3.2 |
Affected products
1- Range: < 4.3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-fcfq-m8p6-gw56ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-31116ghsaADVISORY
- github.com/MobSF/Mobile-Security-Framework-MobSF/commit/4b8bab5a9858c69fe13be4631b82d82186e0d3bdghsax_refsource_MISCWEB
- github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56ghsax_refsource_CONFIRMWEB
- github.com/pypa/advisory-database/tree/main/vulns/mobsf/PYSEC-2025-48.yamlghsaWEB
News mentions
0No linked articles in our index yet.