CVE-2026-33545
MobSF has SQL Injection in its SQLite Database Viewer Utils
MobSF is a mobile application security testing tool used. Prior to version 4.4.6, MobSF's `read_sqlite()` function in `mobsf/MobSF/utils.py` (lines 542-566) uses Python string formatting (`%`) to construct SQL queries with table names read from a SQLite database's `sqlite_master` table. When a security analyst uses MobSF to analyze a malicious mobile application containing a crafted SQLite database, attacker-controlled table names are interpolated directly into SQL queries without parameterization or escaping. This allows an attacker to cause denial of service and achieve SQL injection. Version 4.4.6 patches the issue.
| CWE | CWE-89 |
| Vendor | mobsf |
| Product | mobile-security-framework-mobsf |
| Published | Mar 26, 2026 |
| Last Updated | Mar 27, 2026 |
Get instant alerts for mobsf mobile-security-framework-mobsf
Be the first to know when new medium vulnerabilities affecting mobsf mobile-security-framework-mobsf are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H