CVE-2026-33545
Description
MobSF is a mobile application security testing tool used. Prior to version 4.4.6, MobSF's read_sqlite() function in mobsf/MobSF/utils.py (lines 542-566) uses Python string formatting (%) to construct SQL queries with table names read from a SQLite database's sqlite_master table. When a security analyst uses MobSF to analyze a malicious mobile application containing a crafted SQLite database, attacker-controlled table names are interpolated directly into SQL queries without parameterization or escaping. This allows an attacker to cause denial of service and achieve SQL injection. Version 4.4.6 patches the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mobsfPyPI | < 4.4.6 | 4.4.6 |
Affected products
1- cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*Range: <4.4.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/MobSF/Mobile-Security-Framework-MobSF/commit/6f8a43c1b78d21cfbd7186aaafa7f622d990e0f1nvdPatchWEB
- github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-hqjr-43r5-9q58nvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-hqjr-43r5-9q58ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33545ghsaADVISORY
- github.com/MobSF/Mobile-Security-Framework-MobSF/releases/tag/v4.4.6nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.