Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hqjr-43r5-9q58 | MobSF has SQL Injection in its SQLite Database Viewer Utils |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 27 Mar 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mobsf
Mobsf mobile Security Framework |
|
| Vendors & Products |
Mobsf
Mobsf mobile Security Framework |
Thu, 26 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MobSF is a mobile application security testing tool used. Prior to version 4.4.6, MobSF's `read_sqlite()` function in `mobsf/MobSF/utils.py` (lines 542-566) uses Python string formatting (`%`) to construct SQL queries with table names read from a SQLite database's `sqlite_master` table. When a security analyst uses MobSF to analyze a malicious mobile application containing a crafted SQLite database, attacker-controlled table names are interpolated directly into SQL queries without parameterization or escaping. This allows an attacker to cause denial of service and achieve SQL injection. Version 4.4.6 patches the issue. | |
| Title | MobSF has SQL Injection in its SQLite Database Viewer Utils | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-27T20:20:44.755Z
Reserved: 2026-03-20T18:05:11.832Z
Link: CVE-2026-33545
Updated: 2026-03-27T20:20:40.317Z
Status : Received
Published: 2026-03-26T21:17:06.047
Modified: 2026-03-26T21:17:06.047
Link: CVE-2026-33545
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:23:31Z
Github GHSA