CVE-2025-49846

| EUVD-2025-19895 MEDIUM
2025-07-03 [email protected]
4.1
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
P

Lifecycle Timeline

3
Analysis Generated
Mar 16, 2026 - 02:12 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 02:12 euvd
EUVD-2025-19895
CVE Published
Jul 03, 2025 - 17:15 nvd
MEDIUM 4.1

Description

wire-ios is an iOS client for the Wire secure messaging application. From Wire iOS 3.111.1 to before 3.124.1, messages that were visible in the view port have been logged to the iOS system logs in clear text. Wire application logs created and managed by the application itself were not affected, especially not the logs users can export and send to Wire support. The iOS logs can only be accessed if someone had (physical) access to the underlying unlocked device. The issue manifested itself by calling canOpenUrl() and passing an invalid URL object. When iOS then performs the check and fails, it logs the contents to the system log. This is not documented behaviour. Wire released an emergency fix with version 3.124.1. As a workaround, users can reset their iOS device to remove the offending logs. Since Wire cannot access or modify iOS system logs, there's no other workaround other than a reset.

Analysis

A security vulnerability in wire-ios (CVSS 4.1). Remediation should follow standard vulnerability management procedures.

Technical Context

Vulnerability type not specified by vendor. Affects wire-ios.

Affected Products

['wire-ios']

Remediation

Monitor vendor channels for patch availability.

Priority Score

21
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +20
POC: 0

Share

CVE-2025-49846 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy