Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60722: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Microsoft OneDrive for Android

0
Medium
VulnerabilityCVE-2025-60722cvecve-2025-60722cwe-22
Published: Tue Nov 11 2025 (11/11/2025, 17:59:30 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: OneDrive for Android

Description

Improper limitation of a pathname to a restricted directory ('path traversal') in OneDrive for Android allows an authorized attacker to elevate privileges over a network.

AI-Powered Analysis

AILast updated: 11/18/2025, 19:23:21 UTC

Technical Analysis

CVE-2025-60722 is a path traversal vulnerability classified under CWE-22 found in Microsoft OneDrive for Android version 1.0. This vulnerability stems from improper validation and limitation of pathname inputs, allowing an attacker with authorized access to manipulate file paths to access or modify files outside the intended restricted directories. The flaw can be exploited remotely over the network without requiring user interaction, and the attacker needs only limited privileges (PR:L) to leverage this vulnerability. The vulnerability does not impact confidentiality directly but poses a high risk to integrity by enabling unauthorized modification of files, which could lead to data corruption or malicious file replacement. The CVSS 3.1 base score is 6.5, reflecting medium severity with an attack vector of network (AV:N), low attack complexity (AC:L), and no user interaction (UI:N). No patches or known exploits are currently reported, but the vulnerability's presence in a widely used cloud storage app on Android devices presents a significant risk vector for enterprise environments. The vulnerability could be exploited to elevate privileges within the app or device context, potentially facilitating further lateral movement or persistence in a compromised environment.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized modification of critical files stored or synchronized via OneDrive for Android, impacting data integrity and potentially disrupting business operations. Organizations relying heavily on mobile access to cloud storage are at increased risk, as attackers could exploit this flaw to alter or replace files, leading to data loss or corruption. The network-based attack vector means that attackers could exploit this vulnerability remotely, increasing the threat surface. Additionally, the ability to elevate privileges could allow attackers to gain broader access within the device or network, potentially facilitating further attacks such as lateral movement or deployment of malware. This is particularly concerning for sectors with stringent data integrity requirements such as finance, healthcare, and government institutions across Europe. The lack of user interaction requirement simplifies exploitation, increasing the urgency for mitigation. However, the absence of known exploits in the wild currently reduces immediate risk but should not lead to complacency.

Mitigation Recommendations

European organizations should implement the following specific mitigation strategies: 1) Monitor for updates from Microsoft and prioritize patching OneDrive for Android as soon as a fix is released. 2) Enforce strict access controls and least privilege principles on mobile devices accessing corporate OneDrive accounts to limit the potential impact of compromised credentials. 3) Employ mobile device management (MDM) solutions to restrict installation of unauthorized apps and enforce security policies on Android devices. 4) Monitor network traffic for unusual activity related to OneDrive synchronization that could indicate exploitation attempts. 5) Educate users about the risks of using outdated app versions and encourage prompt updates. 6) Consider implementing application-layer controls or endpoint detection and response (EDR) solutions capable of detecting anomalous file access or modification patterns on mobile devices. 7) Review and tighten OneDrive sharing and synchronization settings to minimize exposure of sensitive directories. These measures go beyond generic advice by focusing on proactive monitoring, strict access control, and rapid patch management tailored to the mobile cloud storage context.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
microsoft
Date Reserved
2025-09-26T05:03:24.537Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69137c4a47ab3590319da100

Added to database: 11/11/2025, 6:11:22 PM

Last enriched: 11/18/2025, 7:23:21 PM

Last updated: 11/20/2025, 10:42:13 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats