Improper export vulnerability in AfterShip Package Tracker App for Android
CVE-2025-9134

4.8MEDIUM

Key Information:

Vendor

Aftership

Vendor
CVE Published:
19 August 2025

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2025-9134?

A security vulnerability has been identified in the AfterShip Package Tracker App for Android, specifically in the AndroidManifest.xml file associated with the component com.aftership.AfterShip. This vulnerability allows for improper export of application components, potentially leading to local exploitation. Attackers must exploit this vulnerability locally, and it has been publicly disclosed. AfterShip has acknowledged the issue and is actively working on a fix.

Affected Version(s)

Package Tracker App 5.24.0

Package Tracker App 5.24.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

fxizenta (VulDB User)
.
CVE-2025-9134 : Improper export vulnerability in AfterShip Package Tracker App for Android