Impact
The vulnerability is a cross‑site scripting flaw in MolotovCherry's Android‑ImageMagick7 library. A malicious image file can contain specially crafted data that, when processed by the library, causes arbitrary JavaScript to be executed in the context of the application or a web view. This enables an attacker to steal sensitive data, hijack sessions or perform other malicious actions, thereby compromising confidentiality and integrity. The weakness is identified as CWE‑79, an input validation oversight that permits injection of executable script.
Affected Systems
The issue affects users of MolotovCherry's Android‑ImageMagick7 version 7.1.2‑11 and earlier. Any Android application that incorporates the vulnerable library without upgrading is susceptible to the attack. The CPE listed indicates the product, and the vendor explicitly states that versions prior to 7.1.2‑11 are at risk.
Risk and Exploitability
The CVSS score of 6.1 indicates a medium severity, while the EPSS score of less than 1% suggests that widespread exploitation is unlikely and the vulnerability is not yet documented in the CISA KEV catalog. Exploitation requires delivery of a malicious image to be processed by the application, which can be achieved remotely or by prompting a user to open a link containing the image. Although not trivial, the impact of successful exploitation is non‑negligible.
OpenCVE Enrichment