{"id":"CVE-2021-43849","details":"cordova-plugin-fingerprint-aio is a plugin provides a single and simple interface for accessing fingerprint APIs on both Android 6+ and iOS. In versions prior to 5.0.1 The exported activity `de.niklasmerz.cordova.biometric.BiometricActivity` can cause the app to crash. This vulnerability occurred because the activity didn't handle the case where it is requested with invalid or empty data which results in a crash. Any third party app can constantly call this activity with no permission. A 3rd party app/attacker using event listener can continually stop the app from working and make the victim unable to open it. Version 5.0.1 of the cordova-plugin-fingerprint-aio doesn't export the activity anymore and is no longer vulnerable. If you want to fix older versions change the attribute android:exported in plugin.xml to false. Please upgrade to version 5.0.1 as soon as possible.","aliases":["GHSA-7vfx-hfvm-rhr8"],"modified":"2026-03-03T01:18:32.483162Z","published":"2021-12-23T17:15:07.373Z","related":["GHSA-7vfx-hfvm-rhr8"],"references":[{"type":"ADVISORY","url":"https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/commit/27434a240f97f69fd930088654590c8ba43569df"},{"type":"ADVISORY","url":"https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/releases/tag/v5.0.1"},{"type":"ADVISORY","url":"https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/security/advisories/GHSA-7vfx-hfvm-rhr8"},{"type":"FIX","url":"https://github.com/NiklasMerz/cordova-plugin-fingerprint-aio/commit/27434a240f97f69fd930088654590c8ba43569df"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/niklasmerz/cordova-plugin-fingerprint-aio","events":[{"introduced":"0"},{"fixed":"27434a240f97f69fd930088654590c8ba43569df"},{"introduced":"0"},{"fixed":"811c06e0a39dc3cea39e9fb765c41058bd23eb05"}]}],"versions":["v0.1-pre","v0.1.3","v0.1.5","v0.2.0","v0.3.0","v0.3.1","v0.3.5","v0.3.6","v0.3.7","v0.4.0","v0.5.0","v0.5.1","v0.6.0","v0.6.1","v0.6.2","v0.7.0","v0.7.3","v0.9.0","v1.0.0","v1.0.1","v1.0.2","v1.1.1","v1.1.2","v1.2.0","v1.2.1","v1.3.0","v1.3.1","v1.3.2","v1.3.3","v1.3.4","v1.3.5","v1.3.6","v1.3.6-0","v1.3.6-1","v1.3.6-2","v1.3.7","v1.3.8","v1.4.0","v1.4.0-0","v1.4.1","v1.5.0","v1.6.0","v1.7.0","v2.0.0","v3.0.0","v3.0.1","v4.0.0","v4.0.1","v4.0.2","v4.1.0","v4.1.1","v4.1.2","v5.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-43849.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}