avatar

Jacob Morrow

Updated: 2026-04-15

1500 Views, 6 min read

Regarding the Android Intent Redirection vulnerability described in the Microsoft Defender Security Research blog post, EngageLab is issuing the following official security statement for developers, customers, and users of applications integrating the EngageLab Android SDK.

Current status: EngageLab Android SDK v5.2.1 and later versions include the fix for this vulnerability. Applications using v5.2.1, v5.2.3, v5.3.0 or later are not affected by this specific issue. Developers still using v5.2.0 or earlier should upgrade immediately.

Current Status

Status Item Details
Platform Android SDK
Vulnerability type Android Intent Redirection
Affected component

MTCommonActivity

Affected versions EngageLab Android SDK v5.2.0 and earlier
Fixed version SDK v5.2.1, released on November 3, 2025
Current action Upgrade to SDK v5.2.1 or later
Known exploitation No known exploitation in the wild based on information available to us

Is EngageLab SDK Safe?

Yes. EngageLab Android SDK v5.2.1 and later versions include the fix for this vulnerability.

Older versions, including v5.2.0 and earlier, should be upgraded immediately. Keeping third-party SDKs up to date remains an important security practice for all Android applications.

What Happened

On April 9, 2026, the Microsoft Defender Security Research Team published a research blog post describing an Android Intent Redirection vulnerability affecting earlier versions of the EngageLab Android SDK.

The issue involved an exported Android Activity component, MTCommonActivity. Under specific conditions, a malicious app already installed on the same device could send a crafted Intent to the affected component and potentially cause the host application to process or redirect it with the host app’s permissions.

This could create a risk of unauthorized access to app-private data in applications using affected SDK versions.

Who Is Affected

This issue affects Android applications that meet both of the following conditions:

  • The application integrates EngageLab Android SDK v5.2.0 or earlier.
  • A malicious application is already installed on the same device.

Applications using EngageLab Android SDK v5.2.1 or later are not affected by this specific vulnerability.

What We Fixed

In SDK v5.2.1, EngageLab changed the affected component configuration by setting MTCommonActivity to android:exported="false". This blocks external applications from invoking the affected Activity component.

Before:

    <activity
    android:name="com.engagelab.privates.common.component.MTCommonActivity"
    android:exported="true" />
    

After, fixed in SDK v5.2.1:

    <activity
    android:name="com.engagelab.privates.common.component.MTCommonActivity"
    android:exported="false" />
    

We also added additional security improvements, including:

  • Input validation for incoming Intent data.
  • Reduction of exported Android components across the SDK.
  • Security review of SDK components.
  • Additional checks in the SDK release process.

Developer Action Required

If your application uses EngageLab Android SDK v5.2.0 or earlier, please upgrade immediately to v5.2.1 or later.

Example:

implementation "com.engagelab:engagelab:5.2.1"

After upgrading, rebuild your application and verify the merged manifest:

app/build/intermediates/merged_manifests/<variant>/AndroidManifest.xml

Confirm that MTCommonActivity is no longer exported.

Timeline

The following timeline summarizes the remediation and disclosure process.

Date Event
May 2025 EngageLab was notified of the issue through the Android / Google security review process.
September 26, 2025 EngageLab released SDK v5.2.0 and requested re-evaluation.
October 30, 2025 Further remediation was required after additional review.
November 3–4, 2025 EngageLab released SDK v5.2.1 with the complete fix.
December 2, 2025 The fix was independently verified as complete.
February 2026 EngageLab proactively notified developers and issued upgrade reminders.
April 9, 2026 Microsoft Defender Security Research publicly published its report.
April 15, 2026 EngageLab published this official security statement.

The remediation process involved multiple rounds of independent validation to ensure the fix was complete and reliable.

Our Security Commitment

We take this issue seriously and have strengthened our SDK security process.

Going forward, EngageLab is implementing:

  • Mandatory merged manifest security review before SDK releases.
  • Automated static analysis for exported Android components.
  • A dedicated security review stage in the SDK development lifecycle.
  • A public security advisory page for future security updates.
  • Faster and clearer developer notification for security-related SDK updates.

We welcome responsible disclosure from security researchers. If you believe you have found a security issue in an EngageLab product, please contact us at:

security@engagelab.com

We aim to acknowledge reports within 24 hours and provide an initial assessment within 48 hours.

FAQ

Is EngageLab SDK safe now?

Yes. EngageLab Android SDK v5.2.1 and later versions include the fix. Developers should ensure they are using v5.2.1 or later.

Which versions are affected?

EngageLab Android SDK v5.2.0 and earlier are affected.

Which versions are fixed?

SDK v5.2.1 and later versions are fixed.

Was this vulnerability exploited in the wild?

Based on information available to us, there is no known evidence of exploitation in the wild.

What should developers do?

Developers should upgrade to SDK v5.2.1 or later and verify the merged Android manifest after rebuilding their application.

Do end users need to take action?

End users should keep their apps updated through official app stores. Application developers are responsible for upgrading the SDK version used in their apps.

What about the reported 50 million Android installs?

Microsoft reported that vulnerable SDK versions were found in Android applications with large-scale installations, including cryptocurrency wallet applications. The vulnerability has been fixed in EngageLab Android SDK v5.2.1 and later versions. Developers using v5.2.0 or earlier should upgrade immediately.

Does this affect iOS, Web, or server-side EngageLab services?

This statement concerns the EngageLab Android SDK and the Android Intent Redirection issue described in the Microsoft Defender Security Research blog post.

Appendix: Affected and Fixed Versions

Version Status Notes
v5.2.0 and earlier ⚠ Vulnerable Upgrade required.
v5.2.1 ✅ Fixed Released November 3, 2025.
v5.2.3, v5.3.0 and later ✅ Fixed Also include this fix.