CVE-2025-11598 Overview
CVE-2025-11598 is an information disclosure vulnerability in the mObywatel iOS application, a Polish government digital identity application. The vulnerability allows an unauthorized user with physical access to the device to view the account owner's personal information through the iOS App Switcher feature. When the application is minimized, a snapshot of the last displayed view remains visible in the App Switcher, even after the login session has ended. The exposed data depends on which application view was displayed before minimization.
This vulnerability is classified as CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor), highlighting the privacy implications of improper screen snapshot protection in mobile applications handling sensitive government identity documents.
Critical Impact
Unauthorized physical access to a device could expose sensitive personal identity information including government documents and personal data visible in the mObywatel application snapshot.
Affected Products
- mObywatel iOS application versions prior to 4.71.0
Discovery Timeline
- 2026-02-03 - CVE-2025-11598 published to NVD
- 2026-02-03 - Last updated in NVD database
Technical Details for CVE-2025-11598
Vulnerability Analysis
The mObywatel iOS application failed to implement proper screen protection mechanisms when the application transitions to the background state. iOS automatically captures a screenshot of the current application state to display in the App Switcher for multitasking purposes. Applications handling sensitive data should implement screenshot protection by replacing the visible content with a placeholder or blur effect during the applicationWillResignActive or applicationDidEnterBackground lifecycle events.
This vulnerability represents a common mobile security oversight where developers fail to account for the iOS application lifecycle's automatic screenshot capture behavior. The root cause stems from the absence of privacy screen implementation during application state transitions.
Root Cause
The vulnerability exists because the mObywatel iOS application did not implement proper view masking or snapshot protection during application backgrounding events. When a user minimizes the app or switches to another application, iOS captures the current screen state. Without explicit protection measures, any sensitive data displayed—such as digital ID cards, personal identification numbers, or other government documents—remains visible in the captured snapshot accessible through the App Switcher.
Attack Vector
Exploitation requires physical access to an unlocked device where the mObywatel application was recently used. An attacker could view sensitive information by accessing the App Switcher (double-pressing the Home button or swiping up on Face ID devices) without needing to authenticate into the application itself. The attack is opportunistic and depends on what information was displayed when the application was last backgrounded.
The attack scenario involves:
- Gaining physical access to an unlocked iOS device
- Accessing the iOS App Switcher interface
- Viewing the mObywatel application preview snapshot
- Observing any personal information visible in the captured screen state
This vulnerability does not require any specialized tools or technical expertise—only physical proximity and brief access to the target device.
Detection Methods for CVE-2025-11598
Indicators of Compromise
- Unusual physical access patterns to mobile devices containing mObywatel
- Reports of unauthorized viewing of personal identity documents
- User complaints about privacy concerns related to App Switcher visibility
Detection Strategies
- Implement mobile device management (MDM) solutions to monitor for physical device access anomalies
- Conduct periodic security audits of mobile applications handling sensitive personal information
- Review application behavior during background state transitions
Monitoring Recommendations
- Enable device access logging where supported by MDM solutions
- Monitor for reports of identity fraud that may correlate with mobile application exposure
- Implement user awareness training about physical device security
How to Mitigate CVE-2025-11598
Immediate Actions Required
- Update the mObywatel iOS application to version 4.71.0 or later immediately
- Ensure automatic app updates are enabled on iOS devices
- Close the mObywatel application completely (remove from App Switcher) when not in active use
- Maintain physical security of devices containing sensitive government applications
Patch Information
This vulnerability was fixed in mObywatel iOS application version 4.71.0. The fix implements proper screen snapshot protection to prevent sensitive information from being visible in the iOS App Switcher. Users should update through the Apple App Store to receive the security patch.
For additional information, refer to the CERT Security Analysis or the official mObywatel Information Portal.
Workarounds
- Always close the mObywatel application completely from the App Switcher after use
- Enable device passcode/biometric authentication to prevent unauthorized physical access
- Navigate to a non-sensitive screen within the application before backgrounding
- Maintain physical custody of devices containing sensitive government identity applications
# iOS users can update the application via App Store
# Settings > App Store > Enable "App Updates" for automatic updates
# Or manually update via App Store > Profile > Available Updates
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


