CVE-2025-48621Initialization of a Resource with an Insecure Default in Frameworks Base

Severity
7.3HIGHNVD
EPSS
0.0%
top 99.87%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 8

Description

In DefaultTransitionHandler.java, there is a possible way to enable a tapjacking attack due to a insecure default. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:HExploitability: 1.3 | Impact: 5.9

Affected Packages4 packages

Androidplatform/frameworks_base16-qpr2-next:016-qpr2-next:2025-12-01+4
Androidplatform/frameworks_native16-qpr2-next:016-qpr2-next:2025-12-01+4
CVEListV5google/android4 versions+3
NVDgoogle/android4 versions+3

Patches

🔴Vulnerability Details

3
GHSA
GHSA-74rw-hch5-4p5v: In DefaultTransitionHandler2025-12-08
CVEList
CVE-2025-48621: In DefaultTransitionHandler2025-12-08
OSV
CVE-2025-48621: In DefaultTransitionHandler2025-12-01

📋Vendor Advisories

1
Android
CVE-2025-48621: Android Security Bulletin 2025-12-01 CVE: CVE-2025-48621 Severity: HIGH Type: EoP Affected AOSP versions: 13, 14, 15, 16 References: A-266433089 [2]2025-12-01
CVE-2025-48621 — Platform Frameworks Base vulnerability | cvebase