Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65814: n/a

0
Medium
VulnerabilityCVE-2025-65814cvecve-2025-65814
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A lack of security checks in the file import process of RHOPHI Analytics LLP Office App-Edit Word v6.4.1 allows attackers to execute a directory traversal.

AI-Powered Analysis

AILast updated: 12/10/2025, 16:49:10 UTC

Technical Analysis

CVE-2025-65814 identifies a directory traversal vulnerability in RHOPHI Analytics LLP Office App-Edit Word version 6.4.1. The root cause is a lack of adequate security checks during the file import process, which allows attackers to craft malicious file paths that traverse directories outside the intended import location. This can lead to unauthorized reading, modification, or overwriting of files on the host system. Directory traversal vulnerabilities typically exploit insufficient sanitization of user-supplied input, enabling attackers to use sequences like '../' to navigate the file system hierarchy. In this case, the vulnerability could be exploited remotely or locally depending on how the file import feature is exposed. No CVSS score has been assigned yet, and no patches or known exploits are currently documented. However, the vulnerability's nature suggests it could be leveraged to compromise system confidentiality and integrity without requiring authentication or user interaction, making it a serious threat. The absence of patches necessitates immediate attention to monitoring and mitigation strategies.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized access to sensitive files, data leakage, or modification of critical documents, undermining confidentiality and integrity. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure where document integrity and confidentiality are paramount. Attackers could potentially overwrite configuration files or inject malicious code, leading to further system compromise or persistence. The lack of authentication requirements and user interaction lowers the barrier for exploitation, increasing the risk of widespread impact. Additionally, organizations relying on RHOPHI Analytics LLP Office App-Edit Word for document processing or collaboration may face operational disruptions. The reputational damage and regulatory consequences under GDPR for data breaches could be significant.

Mitigation Recommendations

1. Immediately restrict file import functionality to trusted sources and disable it if not essential. 2. Implement strict validation and sanitization of all file paths used during import to prevent directory traversal sequences. 3. Monitor file system access logs for unusual or unauthorized file access patterns. 4. Employ application whitelisting and endpoint protection solutions to detect and block suspicious activities related to file manipulation. 5. Segregate systems running the vulnerable software from critical infrastructure to limit potential lateral movement. 6. Engage with RHOPHI Analytics LLP for timely patch releases and apply updates as soon as they become available. 7. Conduct internal audits of document handling workflows to identify and mitigate exposure. 8. Educate users about the risks of importing files from untrusted sources. 9. Consider deploying virtualized or sandboxed environments for handling untrusted documents to contain potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939a47a62aa6c8a0e3b1947

Added to database: 12/10/2025, 4:48:58 PM

Last enriched: 12/10/2025, 4:49:10 PM

Last updated: 12/11/2025, 3:53:06 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats