Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Meesho
Meesho online Shopping App |
|
| Vendors & Products |
Meesho
Meesho online Shopping App |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Meesho Online Shopping App up to 27.3 on Android. Affected is an unknown function of the file /api/endpoint of the component com.meesho.supply. Such manipulation leads to risky cryptographic algorithm. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. | |
| Title | Meesho Online Shopping App com.meesho.supply endpoint risky encryption | |
| Weaknesses | CWE-310 CWE-327 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-07T13:37:44.226Z
Reserved: 2026-04-06T10:00:34.320Z
Link: CVE-2026-5682
Updated: 2026-04-07T13:37:33.042Z
Status : Deferred
Published: 2026-04-06T20:16:29.193
Modified: 2026-04-29T01:00:01.613
Link: CVE-2026-5682
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:22Z