Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14617: Path Traversal in Jehovahs Witnesses JW Library App

0
Medium
VulnerabilityCVE-2025-14617cvecve-2025-14617
Published: Sat Dec 13 2025 (12/13/2025, 14:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Jehovahs Witnesses
Product: JW Library App

Description

A vulnerability has been found in Jehovahs Witnesses JW Library App up to 15.5.1 on Android. Affected is an unknown function of the component org.jw.jwlibrary.mobile.activity.SiloContainer. Such manipulation leads to path traversal. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 12/20/2025, 18:03:17 UTC

Technical Analysis

CVE-2025-14617 is a path traversal vulnerability identified in the Jehovahs Witnesses JW Library App for Android, specifically affecting versions 15.5.0 and 15.5.1. The vulnerability resides in an unspecified function within the component org.jw.jwlibrary.mobile.activity.SiloContainer. Path traversal vulnerabilities allow attackers to manipulate file path inputs to access files and directories outside the intended scope, potentially exposing sensitive data or enabling unauthorized file modifications. In this case, the attack requires local access with limited privileges (PR:L), meaning the attacker must have some level of access to the device, such as through a compromised user account or physical access. The attack does not require user interaction (UI:N) and has low complexity (AC:L), making exploitation feasible if local access is obtained. The CVSS vector indicates low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L), reflecting limited but non-negligible risk. No authentication bypass or remote exploitation is possible, and no exploits are currently known in the wild. The vulnerability was publicly disclosed on December 13, 2025, but no patch links are yet available. The JW Library app is widely used among Jehovah's Witnesses for religious study, and the vulnerability could allow attackers to access or manipulate local app files, potentially leading to data leakage or app malfunction. The lack of remote exploitability limits the threat scope primarily to users with local device access.

Potential Impact

For European organizations, the impact of CVE-2025-14617 is moderate but context-dependent. Organizations or individuals using the JW Library app on Android devices could face unauthorized access to app data or local files if an attacker gains local access to the device. This could lead to confidentiality breaches if sensitive religious or personal data stored by the app is exposed. Integrity of app data could also be compromised, potentially affecting the reliability of the app's content. Availability impact is limited but possible if file manipulation causes app crashes or malfunctions. Since exploitation requires local access and some privileges, the risk is higher in environments where devices are shared, physically accessible, or have weak local security controls. European organizations with mobile device management policies and strong endpoint security will be less affected. However, individual users or smaller groups without strict device controls may be more vulnerable. The absence of remote exploitability reduces the risk of large-scale automated attacks but does not eliminate targeted threats or insider misuse.

Mitigation Recommendations

To mitigate CVE-2025-14617 effectively, European organizations and users should: 1) Monitor for and promptly apply official patches or updates from the JW Library app vendor once available. 2) Restrict local device access by enforcing strong authentication mechanisms such as PINs, passwords, or biometric locks to prevent unauthorized local access. 3) Implement mobile device management (MDM) solutions to control app installations and enforce security policies on Android devices. 4) Educate users about the risks of installing apps from untrusted sources or granting unnecessary permissions. 5) Regularly audit devices for signs of compromise or unauthorized access, especially in shared or public environments. 6) Consider isolating sensitive apps or data using Android’s work profile or sandboxing features to limit the impact of local exploits. 7) Backup important app data securely to enable recovery in case of data corruption or loss. 8) Limit physical access to devices in organizational settings to reduce the risk of local exploitation. These steps go beyond generic advice by focusing on controlling local access and preparing for patch deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T20:51:49.244Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d75402c268cf8855cb26d

Added to database: 12/13/2025, 2:16:32 PM

Last enriched: 12/20/2025, 6:03:17 PM

Last updated: 2/4/2026, 10:41:24 PM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats