CVE-2025-69619
Path Traversal in My Text Editor 1.6.2 Causes DoS
Publication date: 2026-02-05
Last updated on: 2026-03-13
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| zipperapp | my_teditor | 1.6.2 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can lead to a Denial of Service (DoS) condition by allowing an attacker to fill the appβs internal storage or memory with large or numerous arbitrary files. This can compromise data integrity and break the sandbox isolation that protects the appβs data.
By writing unauthorized files into the appβs internal storage, the attacker can disrupt normal app operations, potentially causing crashes or loss of data.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2025-69619 is a path traversal vulnerability in the Android application "My Text Editor" version 1.6.2. It occurs because the app does not properly validate file paths during the file import process. This flaw allows an attacker to manipulate the filename and file content using path traversal sequences (like "../") to write arbitrary files into the appβs internal storage.'}, {'type': 'paragraph', 'content': 'The attack can be triggered by sending a specially crafted Intent with ACTION_SEND, which includes a malicious URI that exploits the path traversal. This lets the attacker write files outside the intended sandbox, potentially placing files directly into the appβs internal storage with arbitrary content.'}, {'type': 'paragraph', 'content': 'The exploit requires no complex user interaction and can be automatically triggered when the victim opens a malicious app that sends the crafted Intent.'}] [2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious Intent actions, specifically ACTION_SEND Intents targeting the My Text Editor app (package: joa.zipper.editor) that include file paths with path traversal sequences such as encoded "../". Additionally, checking the app\'s internal storage directory (/data/data/joa.zipper.editor/) for unexpected or unauthorized files, especially those with unusual names or contents like "test" containing "Attack@Test", can indicate exploitation.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect signs of exploitation include:'}, {'type': 'list_item', 'content': "Using adb shell to list files in the app's internal storage: `adb shell ls -l /data/data/joa.zipper.editor/`"}, {'type': 'list_item', 'content': 'Checking for suspicious files with specific content: `adb shell grep -r "Attack@Test" /data/data/joa.zipper.editor/`'}, {'type': 'list_item', 'content': 'Monitoring logcat for suspicious Intent actions or errors related to file writes: `adb logcat | grep joa.zipper.editor`'}] [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include preventing the exploitation of the path traversal vulnerability by restricting or disabling the import functionality that accepts external Intents with file paths in the vulnerable version of My Text Editor v1.6.2.
Additional steps include:
- Avoid installing or using My Text Editor version 1.6.2 until a patched version is available.
- If possible, uninstall or disable the vulnerable app to prevent exploitation.
- Monitor and restrict apps or processes that can send crafted Intents with ACTION_SEND to the vulnerable app.
- Apply any available patches or updates from the vendor addressing this vulnerability as soon as they are released.