Stay updated with the latest Cybersecurity News on our TecnetBlog.

OnePlus Flaw Exposes SMS to Malicious Apps Without Permission

Written by Levi Yoris | Sep 25, 2025 1:15:00 PM

Smartphones are now the center of your digital life: they store messages, passwords, photos, banking data, and even work documents. That’s why when a critical vulnerability surfaces in an OS like OnePlus's OxygenOS, the risk is serious. And that’s exactly what has just come to light: a flaw that allows malicious apps to access your SMS without any special permissions or user consent.

At TecnetOne, we want you to understand what’s happening, how it could affect you, and the steps you can take to reduce your risk while waiting for an official fix.

 

What Happened With OnePlus?

 

The vulnerability, registered as CVE-2025-10184, affects multiple versions of OxygenOS (from version 12 to the latest, version 15 based on Android 15). It was discovered by researchers at Rapid7, a well-known cybersecurity firm, and as of now, OnePlus has not released a patch to fix the issue.

More concerning, despite responsible disclosure, the company hasn’t officially responded to the researchers. This led Rapid7 to publish full technical details and even a proof-of-concept (PoC) showing how an attacker could exploit the flaw.

 

Where Is the Technical Issue?

 

The flaw originates from OnePlus’s decision to modify Android’s standard telephony package to include additional content providers such as:

 

  1. PushMessageProvider

 

  1. PushShopProvider

 

  1. ServiceNumberProvider

 

The problem is these providers are not properly configured with the correct READ_SMS permission. That means any app installed on your phone can access these data providers by default, even without SMS permissions.

To make things worse, Rapid7 found that user input isn’t sanitized, leaving the door open to blind SQL injection attacks. Simply put, an attacker could reconstruct the content of your SMS messages character by character from the phone’s database.

 

Read more: Fake Cryptocurrency Apps on Facebook: How They Steal Your Data

 

How Can This Be Exploited?

 

To successfully extract your SMS data, certain conditions must be met:

 

  1. The system SMS table must contain at least one record.

 

  1. The content provider must allow insertion of fake rows, which helps if the table is initially empty.

 

  1. The sms table must be located in the same SQLite database file for the injection query to reference it.

 

If those conditions are met, attackers can gradually extract:

 

  1. Full SMS message text

 

  1. Metadata like sender info, phone numbers, and timestamps

 

Affected Devices

 

Researchers successfully tested the exploit on OnePlus 8T and OnePlus 10 Pro, but note that this is not an exhaustive list.

Since the flaw affects a core system component, any device running OxygenOS 12, 13, 14, or 15 is likely at risk. This is not hardware-dependent—it’s a software issue.

 

Extra providers OnePlus added on its Telephony package (Source: Rapid7)

 

What Could Happen to You?

 

If you use an affected OnePlus device, any malicious app could:

 

  1. Read your SMS without requesting permission

 

  1. Steal 2FA codes from banks, email providers, and social media

 

  1. Impersonate you or gain access to your accounts

 

  1. Sell your data on dark web marketplaces

 

This kind of vulnerability creates real risk for identity theft, financial fraud, and unauthorized access to critical services.

 

OnePlus’s Silence

 

The most alarming part isn’t just the vulnerability—it’s OnePlus’s lack of response. As of now, there has been no official communication or patch release.

This leaves users vulnerable and dependent on the vendor to act quickly, while the threat remains real and present.

 

PoC exploit to infer SMS content (Source: Rapid7)

 

What You Can Do in the Meantime

 

Until OnePlus releases a fix, here are some mitigation steps to reduce your exposure:

 

  1. Only install official apps: Use Google Play or verified sources—avoid third-party app stores.

 

  1. Review app permissions: Even though this flaw bypasses them, it's still good practice.

 

  1. Enable MFA (multi-factor authentication): Don’t rely on SMS for verification—use apps like Google or Microsoft Authenticator.

 

  1. Monitor your accounts: Watch your banking, email, and social accounts for any unusual activity.

 

  1. Keep everything updated: Apply all available system and app security patches.

 

What This Case Teaches Us

 

At TecnetOne, we see this vulnerability as a powerful reminder of how fragile device security becomes when manufacturers alter critical Android components without reinforcing proper controls.

It also underscores the fact that SMS is no longer a secure channel for authentication—many experts now recommend moving to app-based MFA or hardware security keys.

 

Related titles: How to Detect and Remove Spyware Apps on Android

 

Conclusion

 

CVE-2025-10184 in OxygenOS is a stark reminder that cybersecurity must be central to your digital strategy. While it specifically impacts OnePlus users, its implications stretch far beyond, as SMS is still widely used for critical processes in banking, social platforms, and enterprise apps.

While waiting for a patch from OnePlus, your best defense is proactive action: install trusted apps, limit SMS-based authentication, and stay vigilant with your accounts.

At TecnetOne, we believe that strong cybersecurity starts with awareness and early action. And this case is a perfect example of why you can never let your guard down in the digital world.