Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65814: n/a

0
Medium
VulnerabilityCVE-2025-65814cvecve-2025-65814
Published: Wed Dec 10 2025 (12/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

A lack of security checks in the file import process of RHOPHI Analytics LLP Office App-Edit Word v6.4.1 allows attackers to execute a directory traversal.

AI-Powered Analysis

AILast updated: 12/17/2025, 17:38:25 UTC

Technical Analysis

CVE-2025-65814 is a directory traversal vulnerability identified in RHOPHI Analytics LLP Office App-Edit Word version 6.4.1. This vulnerability stems from a lack of proper validation and sanitization of file paths during the file import process. Specifically, the application fails to restrict file path inputs, allowing an attacker to craft malicious file import requests that traverse directories beyond the intended import location. This can enable unauthorized reading of arbitrary files on the host system. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 6.5 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). Although no public exploits have been reported yet, the vulnerability represents a significant risk for information disclosure, especially in environments where sensitive documents or configuration files reside on the same system. The CWE-22 classification confirms this is a classic directory traversal issue. No patches or mitigations have been officially released at the time of publication, increasing the urgency for affected organizations to monitor vendor updates and apply security best practices.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive files, including configuration files, user data, or intellectual property stored on systems running the vulnerable RHOPHI Analytics Office App-Edit Word. While the integrity of files is not directly affected, the confidentiality breach could expose business-critical information or personal data, potentially violating GDPR requirements. The limited availability impact might cause minor disruptions if critical files are accessed or locked during exploitation. Sectors such as finance, legal, and government agencies that rely heavily on document processing and analytics tools are at higher risk. The lack of authentication and user interaction requirements means attackers can remotely exploit this vulnerability without insider access, increasing the threat surface. Although no known exploits exist yet, the medium severity rating and network accessibility necessitate proactive defense measures to prevent potential data breaches and compliance violations.

Mitigation Recommendations

1. Monitor RHOPHI Analytics LLP communications and security advisories closely for official patches or updates addressing CVE-2025-65814 and apply them promptly once available. 2. Implement strict input validation and sanitization on file import paths at the application or network level, using allowlists to restrict file locations. 3. Employ network segmentation and firewall rules to limit external access to systems running the vulnerable software, reducing exposure to remote attacks. 4. Use endpoint detection and response (EDR) tools to monitor for suspicious file access patterns indicative of directory traversal attempts. 5. Enforce the principle of least privilege on file system permissions, ensuring the application runs with minimal rights and cannot access sensitive directories unnecessarily. 6. Conduct regular security audits and penetration tests focusing on file handling functionalities to identify and remediate similar vulnerabilities. 7. Educate IT and security teams about the risks of directory traversal and the importance of secure file import mechanisms.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-18T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6939a47a62aa6c8a0e3b1947

Added to database: 12/10/2025, 4:48:58 PM

Last enriched: 12/17/2025, 5:38:25 PM

Last updated: 2/7/2026, 5:23:52 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats