Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-26519 | The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4. |
Mon, 08 Sep 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Donbermoy
Donbermoy android Corona Virus Tracker App For India |
|
| CPEs | cpe:2.3:a:donbermoy:android_corona_virus_tracker_app_for_india:1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Donbermoy
Donbermoy android Corona Virus Tracker App For India |
Fri, 05 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Google
Google android Sourcecodester Sourcecodester corona Virus Tracker App India |
|
| Vendors & Products |
Google
Google android Sourcecodester Sourcecodester corona Virus Tracker App India |
Wed, 03 Sep 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-290 | |
| Metrics |
cvssV3_1
|
Wed, 03 Sep 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The SourceCodester Android application "Corona Virus Tracker App India" 1.0 uses MD5 for digest authentication in `OkHttpClientWrapper.java`. The `handleDigest()` function employs `MessageDigest.getInstance("MD5")` to hash credentials. MD5 is a broken cryptographic algorithm known to allow hash collisions. This makes the authentication mechanism vulnerable to replay, spoofing, or brute-force attacks, potentially leading to unauthorized access. The vulnerability corresponds to CWE-327 and aligns with OWASP M5: Insufficient Cryptography and MASVS MSTG-CRYPTO-4. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-03T19:09:03.703Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-56608
Updated: 2025-09-03T16:54:40.269Z
Status : Analyzed
Published: 2025-09-03T15:15:37.660
Modified: 2025-09-08T17:40:36.713
Link: CVE-2025-56608
No data.
OpenCVE Enrichment
Updated: 2025-09-05T14:02:53Z
EUVD