Medium severity5.3NVD Advisory· Published Aug 19, 2025· Updated Apr 29, 2026
CVE-2025-9134
CVE-2025-9134
Description
A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: "After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it."
Affected products
1- cpe:2.3:a:aftership:aftership_package_tracker:*:*:*:*:*:android:*:*Range: <=5.24.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.mdnvdExploitThird Party Advisory
- github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.mdnvdExploitThird Party Advisory
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.