Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63365: n/a

0
High
VulnerabilityCVE-2025-63365cvecve-2025-63365
Published: Mon Dec 01 2025 (12/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-63365 is a high-severity directory traversal vulnerability in SoftSea EPUB File Reader 1. 0. 0. 0. It affects the EPUB file processing component responsible for extracting archive contents, allowing an attacker to access files outside the intended directory. Exploitation requires local access and user interaction but no privileges, potentially leading to high confidentiality and integrity impact without affecting availability. No known exploits are currently in the wild. European organizations using this software, especially those handling sensitive documents, face risks of data exposure and manipulation. Mitigation involves restricting EPUB file sources, applying patches when available, and monitoring file system access. Countries with higher adoption of SoftSea EPUB Reader and significant document processing sectors, such as Germany, France, and the UK, are more likely affected.

AI-Powered Analysis

AILast updated: 12/08/2025, 19:11:10 UTC

Technical Analysis

CVE-2025-63365 identifies a directory traversal vulnerability in SoftSea EPUB File Reader version 1.0.0.0. The flaw exists in the EPUB archive extraction functionality, where the software improperly sanitizes file paths during the extraction process. This allows an attacker to craft a malicious EPUB file containing specially named entries with directory traversal sequences (e.g., '../') that cause files to be extracted outside the intended directory. Such unauthorized file writes or reads can lead to disclosure or modification of sensitive files on the victim's system. The vulnerability has a CVSS v3.1 score of 7.1, indicating high severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope remains unchanged (S:U), and the impact is high on confidentiality and integrity but none on availability. Although no public exploits are known, the vulnerability poses a significant risk if exploited, especially in environments where users open EPUB files from untrusted sources. The vulnerability is categorized under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). No patches or fixes are currently available, and the vulnerability was published on December 1, 2025.

Potential Impact

For European organizations, this vulnerability can lead to unauthorized access and modification of sensitive files if malicious EPUB files are opened. Sectors such as publishing, education, legal, and government agencies that frequently handle EPUB documents are at higher risk. Confidentiality breaches could expose intellectual property or personal data, potentially violating GDPR regulations. Integrity impacts may result in tampering with critical documents or configuration files, undermining trust and operational reliability. Since exploitation requires local access and user interaction, the threat is more pronounced in environments with less stringent endpoint controls or where users frequently open files from external sources. The absence of availability impact reduces the risk of service disruption but does not diminish the severity of data compromise. The lack of known exploits currently limits immediate widespread risk but does not preclude targeted attacks.

Mitigation Recommendations

European organizations should implement strict controls on the sources of EPUB files, avoiding opening files from untrusted or unknown origins. Employ endpoint security solutions capable of detecting and blocking suspicious file extraction behaviors. Use application whitelisting to restrict execution of unauthorized software. Monitor file system changes in directories commonly used for EPUB extraction to detect anomalous activity. Since no patch is currently available, consider isolating or sandboxing the SoftSea EPUB Reader application to limit filesystem access. Educate users about the risks of opening EPUB files from unverified sources and enforce policies for safe document handling. Regularly review and update security policies to include emerging threats related to document processing software. Once patches or updates are released by the vendor, prioritize their deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692ddeb01fcc71981e874299

Added to database: 12/1/2025, 6:30:08 PM

Last enriched: 12/8/2025, 7:11:10 PM

Last updated: 1/15/2026, 10:56:39 PM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats