Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62185: CWE-427 Uncontrolled Search Path Element in Ankitects Anki

0
Medium
VulnerabilityCVE-2025-62185cvecve-2025-62185cwe-427
Published: Tue Oct 07 2025 (10/07/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Ankitects
Product: Anki

Description

In Ankitects Anki before 25.02.5, a crafted shared deck can place a YouTube downloader executable in the media folder, and this is executed for a YouTube link in the deck. The executable name could be youtube-dl.exe or yt-dlp.exe or yt-dlp_x86.exe.

AI-Powered Analysis

AILast updated: 10/15/2025, 01:06:45 UTC

Technical Analysis

CVE-2025-62185 is a vulnerability classified as CWE-427 (Uncontrolled Search Path Element) affecting Ankitects Anki versions prior to 25.02.5. The flaw arises because Anki executes certain executables located in the media folder when processing YouTube links embedded in shared decks. An attacker can craft a malicious shared deck that includes a YouTube downloader executable—such as youtube-dl.exe, yt-dlp.exe, or yt-dlp_x86.exe—in the media folder. When the victim opens the deck and accesses the YouTube link, the malicious executable is run automatically. This behavior allows an attacker to execute arbitrary code on the victim’s system with the privileges of the user running Anki. The vulnerability does not require user interaction beyond opening the deck and clicking the link, and no prior authentication or elevated privileges are needed. The CVSS v3.1 score is 6.7 (medium severity), reflecting a local attack vector with high confidentiality and integrity impact but high attack complexity. No known exploits have been reported in the wild as of the publication date. The root cause is the lack of validation or control over executables in the media folder and the unsafe execution of these files when processing YouTube links. This vulnerability highlights the risks of executing external binaries from user-supplied content without strict validation or sandboxing.

Potential Impact

For European organizations, especially those in education, research, or any sector using Anki for knowledge management, this vulnerability poses a risk of arbitrary code execution leading to data theft, manipulation, or disruption of learning environments. Confidentiality is at high risk since malicious executables could exfiltrate sensitive information stored or accessed via Anki. Integrity is also compromised as attackers could alter or corrupt data or learning content. Availability impact is low as the vulnerability does not directly cause denial of service. The attack requires local access to the victim’s media folder, so it is more likely to be exploited via social engineering (e.g., sharing malicious decks) or insider threats. European organizations with decentralized or less controlled software environments may be more vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as Anki is popular in academic and professional training contexts across Europe.

Mitigation Recommendations

1. Upgrade Anki to version 25.02.5 or later where this vulnerability is fixed. 2. Implement strict access controls on the media folder to prevent unauthorized write or modification of executables. 3. Educate users to avoid opening shared decks from untrusted sources and to verify the origin of shared content. 4. Use application whitelisting or endpoint protection solutions to detect and block execution of unauthorized binaries in Anki’s media folder. 5. Consider sandboxing or running Anki in a restricted environment to limit the impact of potential code execution. 6. Monitor systems for suspicious activity related to execution of youtube-dl.exe, yt-dlp.exe, or similar tools. 7. Encourage organizational policies to validate and scan shared decks before distribution or use.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e582fea677756fc9a25d63

Added to database: 10/7/2025, 9:15:42 PM

Last enriched: 10/15/2025, 1:06:45 AM

Last updated: 11/22/2025, 12:54:39 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats