Description
A vulnerability has been found in Jehovahs Witnesses JW Library App up to 15.5.1 on Android. Affected is an unknown function of the component org.jw.jwlibrary.mobile.activity.SiloContainer. Such manipulation leads to path traversal. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Problem types
Product status
15.5.1
Timeline
| 2025-12-12: | Advisory disclosed |
| 2025-12-12: | VulDB entry created |
| 2025-12-12: | VulDB entry last update |
Credits
Lu1u (VulDB User)
References
vuldb.com/?id.336303 (VDB-336303 | Jehovahs Witnesses JW Library App org.jw.jwlibrary.mobile.activity.SiloContainer path traversal)
vuldb.com/?ctiid.336303 (VDB-336303 | CTI Indicators (IOB, IOC, TTP))
vuldb.com/?submit.705077 (Submit #705077 | Jehovah’s Witnesses(https://www.jw.org/finder?docid=802013031) JW Library APP (org.jw.jwlibrary.mobile) V15.5.1 Path Traversal)
github.com/Secsys-FDU/AF_CVEs/issues/1
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.