CVE-2026-5455 PUBLISHED

Dialogue App ca.diagram.dialogue config.json hard-coded key

Assigner: VulDB
Reserved: 02.04.2026 Published: 03.04.2026 Updated: 03.04.2026

A vulnerability was determined in Dialogue App up to 4.3.2 on Android. The affected element is an unknown function of the file file res/raw/config.json of the component ca.diagram.dialogue. Executing a manipulation of the argument SEGMENT_WRITE_KEY can lead to use of hard-coded cryptographic key . The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 4.8

Product Status

Vendor n/a
Product Dialogue App
Versions
  • Version 4.3.0 is affected
  • Version 4.3.1 is affected
  • Version 4.3.2 is affected

Credits

  • fxizenta (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Use of Hard-coded Cryptographic Key CWE
  • Key Management Error CWE