CVE-2025-14702
Unknown Unknown - Not Provided
Path Traversal in Smartbit CommV Smartschool SplashActivity

Publication date: 2025-12-15

Last updated on: 2026-04-29

Assigner: VulDB

Description
A flaw has been found in Smartbit CommV Smartschool App up to 10.4.4. Impacted is an unknown function of the component be.smartschool.mobile.SplashActivity. Executing manipulation can lead to path traversal. The attack requires local access. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-15
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2025-12-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
smartbit smartschool 10.4.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-14702 is a path traversal vulnerability in the Smartbit CommV Smartschool App (up to version 10.4.4), specifically in the component be.smartschool.mobile.SplashActivity. It occurs due to insufficient security validation during the file import process, allowing an attacker with local access to manipulate file names and contents to perform path traversal attacks. This enables overwriting arbitrary internal files within the app's private storage, such as configuration or executable files, by sending a specially crafted intent with a malicious file URI. The vulnerability can lead to severe impacts like arbitrary code execution, denial of service, and app malfunction. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing an attacker with local access to overwrite arbitrary files within the Smartschool app's internal storage. This can lead to arbitrary code execution, exposure of sensitive information, denial of service, and malfunction of the application. The attacker can control both the filename and file content, potentially compromising the integrity and availability of the app. [1, 2, 3]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious local activity involving the Smartschool app's SplashActivity component, especially attempts to send intents with file URIs containing path traversal sequences. Since the exploit requires local access and involves crafted intents with malicious file paths, detection could involve inspecting logs or using Android debugging tools to monitor intent actions such as ACTION_SEND targeting be.smartschool.mobile.SplashActivity. Specific commands might include using 'adb logcat' to monitor app logs for unusual file import attempts or intent invocations. However, no explicit detection commands are provided in the resources. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting local access to the affected device to prevent exploitation, monitoring for suspicious app behavior, and considering replacing the affected Smartschool app version (up to 10.4.4) with a non-vulnerable alternative, as no vendor patches or mitigations are currently available. Since the vendor did not respond and no known fixes exist, replacing the product or disabling the vulnerable component is recommended. [3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided resources do not contain information regarding the impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart