The following table lists the changes that have been made to the
CVE-2025-31116 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
CVE Modified
by 134c704f-9b21-4f2e-91b3-4a467353bcc0Mar. 31, 2025
Action Type Old Value New Value Added Reference https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56 -
New CVE Received
by [email protected]Mar. 31, 2025
Action Type Old Value New Value Added Description Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The mitigation for CVE-2024-29190 in valid_host() uses socket.gethostbyname(), which is vulnerable to SSRF abuse using DNS rebinding technique. This vulnerability is fixed in 4.3.2. Added CVSS V3.1 AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L Added CWE CWE-918 Added Reference https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/4b8bab5a9858c69fe13be4631b82d82186e0d3bd Added Reference https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-fcfq-m8p6-gw56