Intent Redirection in EngageSDK Exposes Android Wallets
🔒 Microsoft Defender Security Research Team discovered a critical intent redirection vulnerability in the third‑party EngageSDK that allowed co‑installed apps to abuse a merged, exported activity and act with the victim app's identity and permissions. The flaw, present in a post‑build merged manifest entry (MTCommonActivity) and tied to parseUri(URI_ALLOW_UNSAFE) and grant flags, could yield persistent read/write access to content providers. Microsoft coordinated with EngageLab and the Android Security Team; EngageLab released EngageSDK v5.2.1 on 2025‑11‑03 to set the activity non‑exported, affected apps were removed from Google Play, and Android platform protections were updated. Developers should upgrade and inspect merged manifests for unexpected exported components.
