Article Details

Scrape Timestamp (UTC): 2025-09-23 16:27:48.759

Source: https://www.theregister.com/2025/09/23/rapid7_oneplus_android_bug/

Original Article Text

Click to Toggle View

OnePlus leaves researchers on read over Android bug that exposes texts. Rapid7 warns flaw could let any app peek at your SMS, but smartphone vendor won't pick up. Security researchers report that OnePlus smartphone users remain vulnerable to a critical bug that allows any application to read SMS and MMS data — a flaw that has persisted since late 2021. Rapid7 revealed in a blog published today that multiple versions of OxygenOS contain this security flaw. Since OxygenOS 11 devices remain unaffected in their tests, researchers believe the vulnerability was introduced with OxygenOS 12, released on December 7, 2021. Although Rapid7 only used OnePlus phones in its tests, it believes the issue extends to additional OEMs, given that the vulnerable component is within Android itself. Tracked as CVE-2025-10184 with 8.2 severity rating, the researchers said: "The issue stems from the fact that sensitive internal content providers are accessible without permission, and are vulnerable to SQL injection." The vulnerability operates silently — users receive no alerts when their SMS or MMS data is accessed or transmitted elsewhere. Exploitation requires zero user interaction. A successful exploit could let attackers bypass SMS-based MFA account protections or give surveillance-hungry governments easy access to messages. An attacker-controlled app needs no special permissions in order to read the data, instead it exploits a flaw in the internal content provider com.oneplus.provider.telephony. Content providers, integral to the Android platform, manage data access through APIs and enforce permissions that prevent unauthorized external app access. This vulnerability circumvents those protections entirely. The exploit lets an attacker bypass SMS-based multi-factor authentication protections, and access sensitive personal comms wihtout detection. Rapid7 has not specified whether attackers have abused this vulnerability in the wild, but it did provide details about how an exploit could look, complete with code snippets - an unusual step for an unpatched critical vulnerability. Providing details for a weak spot that could lead to sensitive data access is an industry no-no, especially for an unpatched flaw such as CVE-2025-10184. However, it is not unheard of, and in some cases it is used as a last-resort method of getting a vendor to wake up to a threat and issue fixes. Rapid7 said OnePlus has not responded to numerous attempts to work with it on remediating the issue, the first of which was made on May 1. According to the supplied disclosure timeline, Rapid7 first contacted the OnePlus Security Response Center (OneSRC) and after a few failed attempts, tried its main customer support service, which promised an escalated response that never came. On July 22, Rapid7 said it resorted to messaging OnePlus's X account to no avail, before trying to reach OnePlus via friendly competitor Oppo, also without success. As of today, Rapid7 said it "considers OnePlus a non-responsive vendor," hence the public disclosure. "This vulnerability affects a wide range of OxygenOS versions and multiple OnePlus devices, and we consider the potential impact to be high," Rapid7 said in its writeup. In lieu of a patch, the security shop said OnePlus users should only install apps from trusted sources and remove any non-essential apps. It also recommended changing any SMS-based MFA mechanisms in place to authenticator app-based versions, and opt for encrypted messaging apps over SMS. The Register contacted OnePlus for a response and will update the story with any further information that comes in.

Daily Brief Summary

VULNERABILITIES // Critical Android Bug in OnePlus Devices Exposes SMS Data to Apps

Rapid7 identified a critical vulnerability in OnePlus smartphones, allowing any app to access SMS and MMS data without user permission or notification.

The flaw, tracked as CVE-2025-10184, is present in OxygenOS 12 and later versions, affecting multiple OnePlus devices.

Exploitation of this vulnerability requires no user interaction and can bypass SMS-based multi-factor authentication, posing significant security risks.

Despite repeated attempts by Rapid7 to engage OnePlus for remediation since May 2023, the vendor has not responded, leading to public disclosure.

The vulnerability stems from SQL injection issues in Android's internal content providers, which manage data access and permissions.

Rapid7 advises users to install apps from trusted sources, switch to authenticator app-based MFA, and use encrypted messaging apps to mitigate risks.

The lack of response from OnePlus raises concerns about vendor accountability and the need for proactive security measures in the industry.