CVE-2025-14698
Unknown Unknown - Not Provided
Path Traversal in atlaszz AI Photo Team Galleryit App

Publication date: 2025-12-15

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in atlaszz AI Photo Team Galleryit App 1.3.8.2 on Android. This affects an unknown part of the component gallery.photogallery.pictures.vault.album. This manipulation causes path traversal. The attack needs to be launched locally. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
better_fitness_limited galleryit 1.3.8.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-14698 is a path traversal vulnerability in the Galleryit - Photo Vault, Album app version 1.3.8.2 for Android. It occurs due to improper validation of file paths during the file import process, allowing an attacker with local access to manipulate file names and paths to overwrite arbitrary files within the app's internal storage. This can be exploited by crafting malicious intents with manipulated parameters to overwrite sensitive files, potentially leading to arbitrary code execution or app malfunction. [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker to overwrite critical internal files of the app, which may lead to arbitrary code execution, exposure of sensitive information, denial of service, app malfunction, or failure to launch. The attack requires local access and minimal user interaction, making it relatively easy to exploit. The integrity and availability of the application are at risk. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability requires local access to the device and involves exploitation via a specially crafted intent targeting the Galleryit app's file import process. Detection can involve monitoring for suspicious intents or file overwrite attempts within the app's internal storage, especially looking for unusual path traversal sequences in filenames (e.g., '../'). Since the exploit uses manipulated '_display_name' parameters in intents, commands or tools that monitor Android intents or file system changes could help detect exploitation attempts. However, no specific detection commands are provided in the resources. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include replacing the affected Galleryit app version 1.3.8.2 with an alternative app, as no vendor patches or countermeasures have been provided. Additionally, restricting local access to the device and preventing installation or execution of untrusted apps can reduce risk. Monitoring and limiting the app's permissions related to file imports may also help. Since the vendor did not respond and no fixes are available, avoiding use of the vulnerable app is recommended. [1, 2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart