Impact
The AliasVault App contains a flaw in its Backup Handler that allows a local attacker to manipulate stored arguments within the shared_prefs/aliasvault.xml file. When the values of accessToken, refreshToken, metadata, key_derivation_params, or auth_methods are altered, the app can expose the backup file to an unauthorized control sphere. Although the tokens themselves cannot decrypt the vault without the master password, their exposure still represents a security risk.
Affected Systems
The vulnerability affects AliasVault App versions up to 0.25.3 on Android and iOS. Backups created by these versions are susceptible to tampering. The issue is resolved in version 0.26.0, which includes a patch identified by commit 873ecc03f92238e162f98a068ad56069a922b4f6.
Risk and Exploitability
The CVSS score is 2, indicating a low severity impact. The EPSS is under 1%, implying a low likelihood of exploitation. Nevertheless, the exploit requires local access and has high complexity, making it difficult but not impossible for a skilled adversary. The vulnerability is not currently listed in the CISA KEV catalog. Attackers would need to gain local device control to manipulate the XML preferences, but once successful they could extract backup data that contains session tokens.
OpenCVE Enrichment