Description
A vulnerability has been found in Meesho Online Shopping App up to 27.3 on Android. Affected is an unknown function of the file /api/endpoint of the component com.meesho.supply. Such manipulation leads to risky cryptographic algorithm. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.
Published: 2026-04-06
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cryptographic Weakness
Action: Patch Immediately
AI Analysis

Impact

The flaw exists in an undisclosed function of the com.meesho.supply component within the Meesho Online Shopping App. By manipulating the endpoint, an attacker can cause the app to use a risky cryptographic algorithm, exposing data to potential compromise. The vulnerability is classified as a cryptographic weakness (CWE‑310) and the use of an insecure algorithm (CWE‑327). This weakening permits a remote attacker to undermine encryption strength, potentially enabling data decryption or tampering with encrypted communication.

Affected Systems

Android users of the Meesho Online Shopping App up to and including version 27.3 are affected. The vulnerability resides in the /api/endpoint of the com.meesho.supply component, but the exact function is not identified.

Risk and Exploitability

The CVSS score of 6.3 indicates moderate severity. Public disclosure has occurred, but the exploit is described as difficult and requiring high complexity. No exploit probability score is available, and the vulnerability is not listed in the CISA KEV catalog. Nonetheless, because the attack is remote and the cryptographic reduction could compromise confidentiality, it is recommended to treat the risk as significant and to apply a fix promptly.

Generated by OpenCVE AI on April 7, 2026 at 02:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Meesho app update that addresses cryptographic weaknesses (currently version 27.4 or newer).
  • If no immediate update is available, disable or restrict the use of the /api/endpoint of the com.meesho.supply component through app configuration or network policy.

Generated by OpenCVE AI on April 7, 2026 at 02:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Meesho
Meesho online Shopping App
Vendors & Products Meesho
Meesho online Shopping App

Mon, 06 Apr 2026 20:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Meesho Online Shopping App up to 27.3 on Android. Affected is an unknown function of the file /api/endpoint of the component com.meesho.supply. Such manipulation leads to risky cryptographic algorithm. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.
Title Meesho Online Shopping App com.meesho.supply endpoint risky encryption
Weaknesses CWE-310
CWE-327
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Meesho Online Shopping App
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-07T13:37:44.226Z

Reserved: 2026-04-06T10:00:34.320Z

Link: CVE-2026-5682

cve-icon Vulnrichment

Updated: 2026-04-07T13:37:33.042Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T20:16:29.193

Modified: 2026-04-07T13:20:11.643

Link: CVE-2026-5682

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-07T09:37:22Z

Weaknesses