CVE-2025-49846

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-49846
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-49846.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-49846
Aliases
  • GHSA-pj5p-96xx-hc7m
Published
2025-07-03T17:15:39Z
Modified
2025-07-08T16:52:16.543944Z
Summary
[none]
Details

wire-ios is an iOS client for the Wire secure messaging application. From Wire iOS 3.111.1 to before 3.124.1, messages that were visible in the view port have been logged to the iOS system logs in clear text. Wire application logs created and managed by the application itself were not affected, especially not the logs users can export and send to Wire support. The iOS logs can only be accessed if someone had (physical) access to the underlying unlocked device. The issue manifested itself by calling canOpenUrl() and passing an invalid URL object. When iOS then performs the check and fails, it logs the contents to the system log. This is not documented behaviour. Wire released an emergency fix with version 3.124.1. As a workaround, users can reset their iOS device to remove the offending logs. Since Wire cannot access or modify iOS system logs, there's no other workaround other than a reset.

References

Affected packages

Git / github.com/wireapp/wire-ios

Affected ranges

Type
GIT
Repo
https://github.com/wireapp/wire-ios
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

appstore/3.*

appstore/3.109
appstore/3.124.0

build/bk_3.*

build/bk_3.109
build/bk_3.109.1
build/bk_3.112.0