CVE-2026-33545 PUBLISHED

MobSF has SQL Injection in its SQLite Database Viewer Utils

Assigner: GitHub_M
Reserved: 20.03.2026 Published: 26.03.2026 Updated: 26.03.2026

MobSF is a mobile application security testing tool used. Prior to version 4.4.6, MobSF's read_sqlite() function in mobsf/MobSF/utils.py (lines 542-566) uses Python string formatting (%) to construct SQL queries with table names read from a SQLite database's sqlite_master table. When a security analyst uses MobSF to analyze a malicious mobile application containing a crafted SQLite database, attacker-controlled table names are interpolated directly into SQL queries without parameterization or escaping. This allows an attacker to cause denial of service and achieve SQL injection. Version 4.4.6 patches the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
CVSS Score: 5.3

Product Status

Vendor MobSF
Product Mobile-Security-Framework-MobSF
Versions
  • Version < 4.4.6 is affected

References

Problem Types

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') CWE