CVE-2025-48574: In RCE — Patch Guide
CVE-2025-48574
In validateAddingWindowLw of DisplayPolicy.java, there is a possible way for an app to intercept drag-and-drop events due to a missing permission check. This could lead to local escalation of privileg...
Overview
A high-severity security vulnerability has been identified in the Android operating system’s window management service. The flaw allows a malicious application already installed on a device to intercept sensitive drag-and-drop events without requiring any special permissions or user interaction. This could enable local privilege escalation, granting the app greater control over the device than intended.
Vulnerability Details
The vulnerability exists within the validateAddingWindowLw function of the DisplayPolicy.java component, which is responsible for managing how application windows are displayed and layered on the screen. Due to a missing permission check in this function, a malicious app can create a window that improperly overlays the screen. This window can secretly capture drag-and-drop actions-such as moving files, text, or images between applications-that were intended for other, legitimate apps.
Potential Impact
The primary risk is local privilege escalation. An attacker could leverage this access to:
- Steal Sensitive Data: Intercept confidential information (like passwords, documents, or authentication tokens) as a user drags it between apps.
- Perform Unauthorized Actions: Manipulate drag-and-drop operations to execute actions in a target app with the victim’s permissions.
- Compromise Device Integrity: Use the gained foothold as a stepping stone for further attacks on the device.
Exploitation requires a malicious app to be installed, but no further user interaction is needed once it’s running, making it a potent and stealthy threat.
Remediation and Mitigation
For End Users and IT Administrators:
- Apply Updates: The most critical action is to apply the latest Android security updates provided by your device manufacturer (OEM). This patch is included in the Android security bulletin for the relevant month. Verify that devices are running a patched version.
- Source Apps Carefully: Only install applications from official, trusted sources like the Google Play Store to reduce the risk of installing malware that could exploit this flaw.
- Review App Permissions: Regularly review installed applications and remove any that are unfamiliar or unnecessary.
For Developers: Ensure your applications do not rely on the security of drag-and-drop operations for transmitting highly sensitive data without additional encryption or confirmation steps, as this vulnerability demonstrates a weakness in the platform’s isolation guarantees for this mechanism.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
In broadcastIntentLockedTraced of BroadcastController.java, there is a possible way to launch arbitrary activities from the background on the paired companion phone due to a logic error in the code. T...
A vulnerability has been found in zhanghuanhao LibrarySystem 图书馆管理系统 up to 1.1.1. This impacts an unknown function of the file BookController.java. The manipulation leads to improper access controls. ...
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fr...
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function ...
Other Java Vulnerabilities
SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is possible to obtain arrays containing Function, which allows escaping the sandbox. Given an array containing Function, and Object.fr...
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Prior to 3.0.14, the create_function(args, code) function passes both parameters directly to the Function ...
In DeviceId of DeviceId.java, there is a possible desync in persistence due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. ...
OneUptime is a solution for monitoring and managing online services. Prior to 10.0.18, OneUptime allows project members to run custom Playwright/JavaScript code via Synthetic Monitors to test websites...