Cordova is vulnerable to bypassing whitelist protection mechanism. The vulnerability is possible because it does not anchor the end of domain-name regular expressions. Therefore, it allows attacker to bypass the protection by using a domain name that has an acceptable name as an initial substring.
labs.mwrinfosecurity.com/blog/2012/04/30/building-android-javajavascript-bridges/
openwall.com/lists/oss-security/2014/02/07/9
packetstormsecurity.com/files/124954/apachecordovaphonegap-bypass.txt
seclists.org/bugtraq/2014/Jan/96
www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf
www.internetsociety.org/ndss2014/programme#session3
security-tracker.debian.org/tracker/CVE-2012-6637