CVE-2023-42471
NixOS vulnerability analysis and mitigation

Overview

The wave.ai.browser application through version 1.0.35 for Android contains a critical vulnerability that allows remote attackers to execute arbitrary JavaScript code via a crafted intent. The vulnerability exists in the wave.ai.browser.ui.splash.SplashScreen activity, which is exposed through the application's manifest and uses a WebView component to display web content without proper validation of URI or extra data passed in the intent (GitHub Advisory, NVD).

Technical details

The vulnerability is classified as CWE-94 (Improper Control of Generation of Code) and has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue stems from an exported activity in the application's manifest that allows any third-party application to start the SplashScreen activity without requiring permissions. The WebView component within this activity fails to properly validate or sanitize the URI and extra data received through intents, enabling potential JavaScript code execution (GitHub POC).

Impact

The vulnerability allows attackers to execute arbitrary JavaScript code within the context of the wave.ai.browser application, potentially leading to code execution and information disclosure. Since the vulnerable activity can be accessed without any permissions, any malicious application on the device can exploit this vulnerability to execute arbitrary code within the browser's context (GitHub Advisory).

Mitigation and workarounds

The issue has been fixed in version 2.0.19 of the application. Users should upgrade to this version or later. For developers, recommended security measures include limiting the export of activities, implementing proper intent data validation and sanitization, and securing WebView settings by disabling JavaScript unless necessary (GitHub POC).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22783HIGH8.1
  • NixOSNixOS
  • iris
NoYesJan 12, 2026
CVE-2026-0821MEDIUM6.9
  • NixOSNixOS
  • quickjs
NoNoJan 10, 2026
CVE-2025-68949MEDIUM5.3
  • NixOSNixOS
  • n8n
NoYesJan 13, 2026
CVE-2026-22784LOW2.3
  • NixOSNixOS
  • lychee
NoYesJan 12, 2026
CVE-2026-23497LOW1.3
  • NixOSNixOS
  • learning
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management