Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63365: n/a

0
Unknown
VulnerabilityCVE-2025-63365cvecve-2025-63365
Published: Mon Dec 01 2025 (12/01/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

SoftSea EPUB File Reader 1.0.0.0 is vulnerable to Directory Traversal. The vulnerability resides in the EPUB file processing component, specifically in the functionality responsible for extracting and handling EPUB archive contents.

AI-Powered Analysis

AILast updated: 12/01/2025, 18:45:26 UTC

Technical Analysis

CVE-2025-63365 identifies a directory traversal vulnerability in SoftSea EPUB File Reader version 1.0.0.0. The vulnerability exists in the EPUB file processing component responsible for extracting and handling the contents of EPUB archives. EPUB files are essentially ZIP archives containing HTML, CSS, images, and other resources. The directory traversal flaw allows specially crafted EPUB files to include path traversal sequences (e.g., ../) in file names inside the archive. When the vulnerable reader extracts these files, it can write them outside the intended extraction directory, potentially overwriting critical system or user files. This can lead to unauthorized file creation or modification, which may be leveraged to execute arbitrary code, corrupt files, or disrupt system operations. Exploitation requires the victim to open a malicious EPUB file, so user interaction is necessary. No authentication is required to trigger the vulnerability. While no public exploits are currently known, the flaw is significant due to the common use of EPUB readers and the sensitive nature of file system access. The vulnerability was reserved on October 27, 2025, and published on December 1, 2025, but no patches or fixes are currently linked. The absence of a CVSS score means severity must be assessed based on impact and exploitability factors.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those in publishing, education, and digital content distribution sectors that rely on EPUB readers. Successful exploitation could lead to unauthorized file overwrites or creation, potentially compromising system integrity and confidentiality. This could result in data loss, corruption of critical files, or even execution of malicious code if the attacker crafts payloads to overwrite executable files or configuration files. The requirement for user interaction (opening a malicious EPUB) somewhat limits mass exploitation but targeted attacks against employees or users are feasible. Organizations handling sensitive or regulated data could face compliance and reputational risks if this vulnerability is exploited. Additionally, the lack of patches increases exposure time, making proactive mitigation critical. The threat is heightened in environments where endpoint security is weak or where users frequently open EPUB files from untrusted sources.

Mitigation Recommendations

1. Monitor for and apply any official patches or updates from SoftSea as soon as they become available. 2. Until patches are released, restrict file system permissions for the EPUB reader application to limit its ability to write outside designated directories. 3. Employ application whitelisting and sandboxing techniques to contain the EPUB reader’s file operations. 4. Educate users to avoid opening EPUB files from untrusted or unknown sources. 5. Use endpoint detection and response (EDR) solutions to monitor for suspicious file extraction activities indicative of directory traversal exploitation. 6. Implement network-level controls to block delivery of malicious EPUB files via email or web downloads where possible. 7. Consider alternative EPUB readers with a stronger security track record if immediate patching is not feasible. 8. Conduct regular security audits and file integrity monitoring on systems running the vulnerable software to detect unauthorized changes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692ddeb01fcc71981e874299

Added to database: 12/1/2025, 6:30:08 PM

Last enriched: 12/1/2025, 6:45:26 PM

Last updated: 12/1/2025, 7:40:52 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats