Improper Export Vulnerability in UAB Paytend App for Android
CVE-2025-9671
Key Information:
- Vendor
Uab
- Status
- Vendor
- CVE Published:
- 29 August 2025
Badges
What is CVE-2025-9671?
A weakness has been discovered in the UAB Paytend App version 2.1.9 for Android, specifically within the AndroidManifest.xml file associated with the component com.passport.cash. This vulnerability allows for local manipulation that could improperly export sensitive Android application components. Publicly available exploit methods increase the risk of this vulnerability being leveraged against vulnerable installations. Despite outreach, the vendor has not responded to this disclosure, leaving users at potential risk.
Affected Version(s)
Paytend App 2.1.0
Paytend App 2.1.1
Paytend App 2.1.2
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved