Vulnerability Description
A vulnerability was determined in Dialogue App up to 4.3.2 on Android. The affected element is an unknown function of the file file res/raw/config.json of the component ca.diagram.dialogue. Executing a manipulation of the argument SEGMENT_WRITE_KEY can lead to use of hard-coded cryptographic key . The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://vuldb.com/submit/781761
- https://vuldb.com/vuln/355043
- https://vuldb.com/vuln/355043/cti
- https://www.notion.so/Segment-Write-Key-Exposure-Leading-to-Data-Injection-and-U
FAQ
What is CVE-2026-5455?
CVE-2026-5455 is a vulnerability with a CVSS score of 3.3 (LOW). A vulnerability was determined in Dialogue App up to 4.3.2 on Android. The affected element is an unknown function of the file file res/raw/config.json of the component ca.diagram.dialogue. Executing ...
How severe is CVE-2026-5455?
CVE-2026-5455 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5455?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.