CVE-2025-69619
Unknown Unknown - Not Provided
Path Traversal in My Text Editor 1.6.2 Causes DoS

Publication date: 2026-02-05

Last updated on: 2026-03-13

Assigner: MITRE

Description
A path traversal in My Text Editor v1.6.2 allows attackers to cause a Denial of Service (DoS) via writing files to the internal storage.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-05
Last Modified
2026-03-13
Generated
2026-05-07
AI Q&A
2026-02-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
zipperapp my_teditor 1.6.2
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can lead to a Denial of Service (DoS) condition by allowing an attacker to fill the app’s internal storage or memory with large or numerous arbitrary files. This can compromise data integrity and break the sandbox isolation that protects the app’s data.

By writing unauthorized files into the app’s internal storage, the attacker can disrupt normal app operations, potentially causing crashes or loss of data.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2025-69619 is a path traversal vulnerability in the Android application "My Text Editor" version 1.6.2. It occurs because the app does not properly validate file paths during the file import process. This flaw allows an attacker to manipulate the filename and file content using path traversal sequences (like "../") to write arbitrary files into the app’s internal storage.'}, {'type': 'paragraph', 'content': 'The attack can be triggered by sending a specially crafted Intent with ACTION_SEND, which includes a malicious URI that exploits the path traversal. This lets the attacker write files outside the intended sandbox, potentially placing files directly into the app’s internal storage with arbitrary content.'}, {'type': 'paragraph', 'content': 'The exploit requires no complex user interaction and can be automatically triggered when the victim opens a malicious app that sends the crafted Intent.'}] [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for suspicious Intent actions, specifically ACTION_SEND Intents targeting the My Text Editor app (package: joa.zipper.editor) that include file paths with path traversal sequences such as encoded "../". Additionally, checking the app\'s internal storage directory (/data/data/joa.zipper.editor/) for unexpected or unauthorized files, especially those with unusual names or contents like "test" containing "Attack@Test", can indicate exploitation.'}, {'type': 'paragraph', 'content': 'Suggested commands to detect signs of exploitation include:'}, {'type': 'list_item', 'content': "Using adb shell to list files in the app's internal storage: `adb shell ls -l /data/data/joa.zipper.editor/`"}, {'type': 'list_item', 'content': 'Checking for suspicious files with specific content: `adb shell grep -r "Attack@Test" /data/data/joa.zipper.editor/`'}, {'type': 'list_item', 'content': 'Monitoring logcat for suspicious Intent actions or errors related to file writes: `adb logcat | grep joa.zipper.editor`'}] [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include preventing the exploitation of the path traversal vulnerability by restricting or disabling the import functionality that accepts external Intents with file paths in the vulnerable version of My Text Editor v1.6.2.

Additional steps include:

  • Avoid installing or using My Text Editor version 1.6.2 until a patched version is available.
  • If possible, uninstall or disable the vulnerable app to prevent exploitation.
  • Monitor and restrict apps or processes that can send crafted Intents with ACTION_SEND to the vulnerable app.
  • Apply any available patches or updates from the vendor addressing this vulnerability as soon as they are released.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart