Description
A vulnerability was found in GRID Organiser App up to 1.0.5 on Android. Impacted is an unknown function of the file file res/raw/app.json of the component co.gridapp.organiser. Performing a manipulation of the argument SegmentWriteKey results in use of hard-coded cryptographic key
. The attack is only possible with local access. The exploit has been made public and could be used.
Published: 2026-04-03
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Cryptographic Key Misuse
Action: Patch
AI Analysis

Impact

The GRID Organiser App (co.gridapp.organiser) contains a hard‑coded cryptographic key in its res/raw/app.json file. By manipulating the SegmentWriteKey argument, a local attacker can force the app to use the embedded key during cryptographic operations. This misuse can undermine the integrity of encrypted data, potentially allowing the attacker to inject or modify information. The vulnerability is a classic key‑management flaw (CWE‑320) and a security flaw involving compromised key usage (CWE‑321).

Affected Systems

Versions of the GRID Organiser App up to 1.0.5 for Android are affected. No other products or newer releases were identified in the advisory. The issue is tied specifically to the co.gridapp.organiser component.

Risk and Exploitability

The CVSS score is 4.8, indicating medium severity. Exploitation is limited to users who have local device access, and the EPSS metric is not available. The vulnerability is not referenced in the CISA KEV catalog. A public exploit demonstrates that the key misuse can be triggered by local manipulation, and while the advisory implies possible data injection or user‑profile changes, that outcome is inferred and not explicitly confirmed in the description.

Generated by OpenCVE AI on April 3, 2026 at 07:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify if a newer version of the GRID Organiser App has been released that removes the hard‑coded key and upgrade if available.
  • If no update is available, disable or restrict local modification of the SegmentWriteKey argument to prevent unintended key usage.
  • Ensure that cryptographic operations use a device‑generated key or secure key‑management process instead of an embedded constant.
  • Regularly review the vendor’s security advisories and monitor for any future patches.

Generated by OpenCVE AI on April 3, 2026 at 07:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Grid
Grid organiser App
Vendors & Products Grid
Grid organiser App

Fri, 03 Apr 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in GRID Organiser App up to 1.0.5 on Android. Impacted is an unknown function of the file file res/raw/app.json of the component co.gridapp.organiser. Performing a manipulation of the argument SegmentWriteKey results in use of hard-coded cryptographic key . The attack is only possible with local access. The exploit has been made public and could be used.
Title GRID Organiser App co.gridapp.organiser app.json hard-coded key
Weaknesses CWE-320
CWE-321
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Grid Organiser App
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-03T20:01:09.963Z

Reserved: 2026-04-02T22:14:07.769Z

Link: CVE-2026-5454

cve-icon Vulnrichment

Updated: 2026-04-03T20:01:03.963Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-03T05:16:23.940

Modified: 2026-04-03T16:10:23.730

Link: CVE-2026-5454

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:15:45Z

Weaknesses