EngageLab SDK flaw exposed millions of Android crypto wallet users to data theft risk


A security flaw in the EngageLab Android SDK exposed more than 30 million crypto wallet app installations to possible data theft, according to Microsoft. The company said the bug allowed a malicious app on the same device to bypass Android’s sandbox protections and gain unauthorized access to private app data.

The issue affected EngageSDK, a third-party library developers use for push notifications and in-app messaging. Microsoft said the broader impact stretched beyond crypto wallets, with total exposure across all affected Android apps topping 50 million installations.

Microsoft said the flaw was an intent redirection vulnerability inside an exported activity called MTCommonActivity. Because the activity was added to the merged Android manifest during the build process, developers may not have noticed it in their original source code.

How the flaw worked

On Android, apps communicate through intents. Microsoft said a malicious app could send a crafted URI to the exposed MTCommonActivity, which then passed it through internal methods and launched a new intent using the trusted app’s own permissions.

Visual representation of an intent redirection (Source – Microsoft)

That flow created a dangerous trust break. Microsoft said the SDK used the URI_ALLOW_UNSAFE flag, which let attacker-controlled input carry read and write permission flags and potentially gain persistent access to sensitive app storage.

In affected wallet apps, that could expose credentials, financial data, and other private information. Microsoft said all detected apps using vulnerable SDK versions were removed from Google Play, and it found no evidence of active exploitation at the time of disclosure.

Why this bug matters

This case shows the risk that comes with third-party mobile libraries. A single vulnerable SDK can spread the same weakness across many unrelated apps, including apps that handle money, credentials, and highly sensitive personal data.

Microsoft said the flaw was first found in EngageSDK version 4.5.4 in April 2025. It reported the issue to EngageLab through coordinated disclosure, then escalated it to the Android Security Team in May 2025 because the problem affected apps distributed through Google Play.

The processPlatformMessage() method (Source – Microsoft)

EngageLab fixed the issue in version 5.2.1 on November 3, 2025 by marking the vulnerable activity as non-exported. Microsoft also said Android’s layered security model can provide added mitigations against some intent-based abuse, which helped reduce exploitation risk while the ecosystem patched.

Key details

ItemDetails
Affected componentEngageLab EngageSDK for Android
Vulnerability typeIntent redirection
RiskUnauthorized access to private app data
Crypto wallet exposure30M+ installations
Total app exposure50M+ installations
First affected version identified4.5.4
Fixed version5.2.1
Fix dateNovember 3, 2025
Exploitation seen in the wildNo evidence reported by Microsoft

The figures and timeline above come from Microsoft’s April 9 security write-up and follow-on reporting.

What developers and users should do

  • Upgrade to EngageSDK 5.2.1 or later immediately.
  • Inspect the merged Android manifest after every build, not just the original source files.
  • Review exported activities and permissions introduced by third-party SDKs.
  • Validate all incoming intent data before the app processes it.
  • Remove or replace outdated app dependencies that quietly expand app attack surface.

For users, the immediate risk appears lower now than it was before disclosure because vulnerable apps identified by Microsoft were removed from Google Play and Android has deployed automatic mitigations for this specific issue. Still, anyone using sideloaded or outdated wallet apps should update as soon as a patched version becomes available.

Getting READ – WRITE access to non-exported content providers (Source – Microsoft)

The bigger lesson is that mobile app security no longer depends only on the code a developer writes directly. It also depends on every SDK that enters the build, every manifest change added during compilation, and every trust assumption made between apps on the same device.

FAQ

What is EngageSDK?

It is an Android software development kit from EngageLab that helps apps add push notifications and real-time messaging features.

How many users were affected?

Microsoft said more than 30 million crypto wallet app installs were exposed, and total exposure across all affected apps exceeded 50 million installs.

Was the flaw exploited in real attacks?

Microsoft said it had no evidence of in-the-wild exploitation at the time it published the disclosure.

Which version fixed the issue?

EngageLab fixed the bug in EngageSDK version 5.2.1 on November 3, 2025.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages