Improper export vulnerability in AfterShip Package Tracker App for Android
CVE-2025-9134
Key Information:
- Vendor
Aftership
- Status
- Vendor
- CVE Published:
- 19 August 2025
Badges
What is CVE-2025-9134?
A security vulnerability has been identified in the AfterShip Package Tracker App for Android, specifically in the AndroidManifest.xml file associated with the component com.aftership.AfterShip. This vulnerability allows for improper export of application components, potentially leading to local exploitation. Attackers must exploit this vulnerability locally, and it has been publicly disclosed. AfterShip has acknowledged the issue and is actively working on a fix.
Affected Version(s)
Package Tracker App 5.24.0
Package Tracker App 5.24.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved