In multiple locations, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.
References
Configurations
Configuration 1 (hide)
|
History
06 Mar 2026, 04:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
03 Mar 2026, 18:18
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Google android
|
|
| CPE | cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:* |
|
| References | () https://source.android.com/security/bulletin/2026-03-01 - Broken Link |
02 Mar 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-22 |
02 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-02 19:16
Updated : 2026-03-06 04:15
NVD link : CVE-2025-48567
Mitre link : CVE-2025-48567
CVE.ORG link : CVE-2025-48567
JSON object : View
Products Affected
- android
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
