Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mobsf
  4. ›
  5. CVE-2025-31116

CVE-2025-31116: Mobile Security Framework (MobSF) has a SSRF Vulnerability fix bypass on assetlinks_check with DNS Rebinding

March 31, 2025

The latest deployed fix for the SSRF vulnerability is through the use of the call valid_host(). The code available at lines /ae34f7c055aa64fca58e995b70bc7f19da6ca33a/mobsf/MobSF/utils.py#L907-L957 is vulnerable to SSRF abuse using DNS rebinding technique.

References

  • github.com/MobSF/Mobile-Security-Framework-MobSF
  • github.com/MobSF/Mobile-Security-Framework-MobSF/commit/4b8bab5a9858c69fe13be4631b82d82186e0d3bd
  • github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56
  • github.com/advisories/GHSA-fcfq-m8p6-gw56
  • nvd.nist.gov/vuln/detail/CVE-2025-31116

Code Behaviors & Features

Detect and mitigate CVE-2025-31116 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 4.3.2

Fixed versions

  • 4.3.2

Solution

Upgrade to version 4.3.2 or above.

Impact 4.4 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L

Learn more about CVSS

Weakness

  • CWE-918: Server-Side Request Forgery (SSRF)

Source file

pypi/mobsf/CVE-2025-31116.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:43 +0000.