OnePlus OxygenOS Vulnerability Exposes SMS to Rogue Apps, Patch Delayed

A significant vulnerability in OnePlus's OxygenOS (CVE-2025-10184) allows rogue apps to access and send SMS without permission, risking data interception. OnePlus has acknowledged the issue but delayed patching, amid September 2025 security updates for devices like Nord 5 and OnePlus 13. Users should scrutinize app permissions while awaiting a fix.
OnePlus OxygenOS Vulnerability Exposes SMS to Rogue Apps, Patch Delayed
Written by Lucas Greene

In the fast-evolving world of smartphone security, OnePlus users have been on high alert following revelations of a significant vulnerability that allows rogue apps to access and send text messages without permission. This flaw, detailed in a recent report by cybersecurity firm Rapid7, exposes sensitive SMS data, potentially enabling malicious actors to intercept two-factor authentication codes or personal communications. According to the advisory, the issue stems from a permissions oversight in OxygenOS, OnePlus’s customized Android skin, affecting multiple models including popular flagships like the OnePlus 13.

The vulnerability, tracked as CVE-2025-10184, was first disclosed publicly after OnePlus failed to patch it promptly, despite being notified months earlier. As GBHackers reported, attempts to coordinate through the company’s bug bounty program were stymied by restrictive nondisclosure agreements, leaving users in limbo. Industry experts warn that such delays not only erode trust but also heighten risks in an era where mobile devices handle everything from banking to confidential business dealings.

Emerging Threats and OnePlus’s Response Strategy

OnePlus has acknowledged the problem, confirming an investigation as of September 24, but no firm timeline for a fix has been announced, per updates from BleepingComputer. This comes amid broader September 2025 security rollouts, where OnePlus has pushed OxygenOS updates incorporating the latest Android security patches to devices like the Nord 5 and 13 series. For instance, the OxygenOS 15.0.2.600 update for the Nord 5 integrates protections against nearly 100 vulnerabilities, as outlined in Google’s Android Security Bulletin for that month.

These patches address critical issues, including remote code execution flaws that could allow attackers to gain elevated privileges without user interaction. Sources from Gizmochina note that the updates also introduce usability enhancements, such as smoother animations and improved privacy controls, signaling OnePlus’s effort to blend security with user experience. Yet, for industry insiders, the real question is whether these incremental fixes suffice against sophisticated threats like those exploiting unpatched SMS vulnerabilities.

Industry Implications and User Mitigation Steps

The delay in addressing the SMS flaw underscores a broader challenge for Android OEMs: balancing rapid innovation with robust security protocols. Compared to rivals like Samsung, which rolled out a comprehensive September 2025 patch fixing dozens of exposures as detailed by SamMobile, OnePlus’s response appears reactive rather than proactive. Analysts point out that this could impact enterprise adoption, where data breaches carry steep financial and reputational costs.

For affected users, immediate workarounds include scrutinizing app permissions and avoiding sideloading from untrusted sources, advice echoed in forums like Reddit’s r/oneplus community. OnePlus’s commitment to at least three years of security updates for smartphones, as stated on their official PSTI page, offers some reassurance, but insiders emphasize the need for faster vulnerability disclosure and patching cycles to keep pace with evolving cyber threats.

Looking Ahead: Strengthening Ecosystem Security

As the September updates propagate— with models like the OnePlus 12R receiving OxygenOS 15.0.0.860 in regions like India, per ShiftDelete.Net—there’s optimism that the SMS flaw will be resolved in an imminent release. This incident highlights the importance of collaborative efforts, such as OnePlus’s Security Response Center, in fostering a more resilient mobile ecosystem.

Ultimately, for tech professionals and corporate IT teams, the episode serves as a reminder to diversify device fleets and prioritize vendors with proven security track records. With Android’s open-source nature amplifying both innovation and risks, OnePlus’s handling of this patch could define its standing among premium smartphone makers in the years ahead.

Subscribe for Updates

MobileDevPro Newsletter

By signing up for our newsletter you agree to receive content related to ientry.com / webpronews.com and our affiliate partners. For additional information refer to our terms of service.

Notice an error?

Help us improve our content by reporting any issues you find.

Get the WebProNews newsletter delivered to your inbox

Get the free daily newsletter read by decision makers

Subscribe
Advertise with Us

Ready to get started?

Get our media kit

Advertise with Us