Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14617: Path Traversal in Jehovahs Witnesses JW Library App

0
Medium
VulnerabilityCVE-2025-14617cvecve-2025-14617
Published: Sat Dec 13 2025 (12/13/2025, 14:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Jehovahs Witnesses
Product: JW Library App

Description

A vulnerability has been found in Jehovahs Witnesses JW Library App up to 15.5.1 on Android. Affected is an unknown function of the component org.jw.jwlibrary.mobile.activity.SiloContainer. Such manipulation leads to path traversal. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 12/13/2025, 14:30:55 UTC

Technical Analysis

CVE-2025-14617 is a path traversal vulnerability identified in the Jehovahs Witnesses JW Library App for Android, specifically affecting versions 15.5.0 and 15.5.1. The vulnerability resides in an unspecified function within the component org.jw.jwlibrary.mobile.activity.SiloContainer, which improperly validates or sanitizes file path inputs. This flaw allows an attacker with local access and limited privileges (PR:L) to manipulate file paths, potentially accessing or modifying files outside the intended directory scope. The attack vector requires local access to the device but does not require user interaction or elevated privileges, making it feasible for a malicious app or user with limited permissions to exploit. The CVSS 4.0 vector (AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects a medium severity rating, highlighting limited confidentiality, integrity, and availability impacts but ease of exploitation once local access is obtained. The vulnerability could allow unauthorized reading or writing of files, leading to data leakage, corruption, or denial of service within the app environment. Although no public exploits are reported in the wild, the disclosure of exploit details increases the risk of future attacks. The vulnerability underscores the importance of secure coding practices around file path handling and input validation in mobile applications.

Potential Impact

For European organizations, the impact of CVE-2025-14617 depends largely on the usage of the JW Library App within their user base or workforce. While the app is primarily targeted at Jehovah’s Witnesses for religious study, organizations with employees or members using the app on Android devices could face risks of data exposure or manipulation. The path traversal flaw could allow attackers with local access—such as through a compromised device or malicious insider—to access sensitive files or disrupt app functionality. This may lead to confidentiality breaches if personal or organizational data is stored or cached by the app. Integrity could be compromised if files are altered, potentially affecting the reliability of the app’s content. Availability impacts are possible if critical files are deleted or corrupted. Given the medium severity and requirement for local access, the threat is moderate but should not be ignored, especially in environments with shared or less secure mobile devices. European organizations should consider the risk in contexts where device security is not tightly controlled or where the app is widely used.

Mitigation Recommendations

1. Restrict local access to devices running the JW Library App by enforcing strong device authentication and limiting physical access. 2. Monitor for updates from the Jehovahs Witnesses JW Library App vendor and apply patches promptly once available. 3. Employ mobile device management (MDM) solutions to control app installations and permissions, minimizing exposure to malicious apps that could exploit local vulnerabilities. 4. Educate users about the risks of installing untrusted applications or granting unnecessary permissions that could facilitate local exploitation. 5. Implement file system monitoring on devices to detect unusual file access or modifications related to the app’s directories. 6. Encourage users to avoid rooting or jailbreaking devices, which can increase the risk of local privilege escalation and exploitation. 7. If feasible, isolate the app’s data storage using Android’s scoped storage features or sandboxing to limit the impact of path traversal. 8. Conduct regular security audits of mobile applications used within the organization to identify and remediate similar vulnerabilities proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-12T20:51:49.244Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693d75402c268cf8855cb26d

Added to database: 12/13/2025, 2:16:32 PM

Last enriched: 12/13/2025, 2:30:55 PM

Last updated: 12/15/2025, 3:27:35 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats