A lack of security checks in the file import process of RHOPHI Analytics LLP Office App-Edit Word v6.4.1 allows attackers to execute a directory traversal.
References
| Link | Resource |
|---|---|
| https://developer.android.com/privacy-and-security/risks/untrustworthy-contentprovider-provided-filename | Exploit Third Party Advisory Mitigation |
| https://github.com/Secsys-FDU/AF_CVEs/issues/6 | Exploit Issue Tracking |
Configurations
History
17 Dec 2025, 17:51
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:a1apps:office_app-edit_word\,_pdf_file:6.4.1:*:*:*:*:android:*:* | |
| First Time |
A1apps
A1apps office App-edit Word\, Pdf File |
|
| References | () https://developer.android.com/privacy-and-security/risks/untrustworthy-contentprovider-provided-filename - Exploit, Third Party Advisory, Mitigation | |
| References | () https://github.com/Secsys-FDU/AF_CVEs/issues/6 - Exploit, Issue Tracking |
10 Dec 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-10 17:15
Updated : 2025-12-17 17:51
NVD link : CVE-2025-65814
Mitre link : CVE-2025-65814
CVE.ORG link : CVE-2025-65814
JSON object : View
Products Affected
a1apps
- office_app-edit_word\,_pdf_file
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
