CVE-2025-56608

MEDIUM

Donbermoy Android Corona Virus Tracke... - Authentication Bypass by Spoofing

Title source: rule

Description

The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4.

Exploits (1)

nomisec WRITEUP
by anonaninda · poc
https://github.com/anonaninda/Aninda-security-advisories

Scores

CVSS v3 4.2
EPSS 0.0003
EPSS Percentile 9.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-290
Status published
Products (1)
donbermoy/android_corona_virus_tracker_app_for_india 1.0
Published Sep 03, 2025
Tracked Since Feb 18, 2026