CVE-2025-14617

5.3 MEDIUM

📋 TL;DR

A path traversal vulnerability in the Jehovah's Witnesses JW Library App for Android allows local attackers to access files outside the intended directory. This affects users running versions up to 15.5.1 on Android devices. The vulnerability requires local access to the device for exploitation.

💻 Affected Systems

Products:
  • Jehovah's Witnesses JW Library App
Versions: Up to and including 15.5.1
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Android version of the app. Requires local access to device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could read sensitive files stored on the device, potentially accessing personal data, authentication tokens, or other app-specific information.

🟠

Likely Case

Limited file access within the app's sandbox or adjacent directories, potentially exposing user preferences, cached content, or configuration files.

🟢

If Mitigated

No impact if proper Android sandboxing prevents traversal beyond app boundaries, or if the app doesn't store sensitive data in accessible locations.

🌐 Internet-Facing: LOW - The vulnerability requires local access and cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - Local access required, so risk exists if device is lost/stolen, shared, or compromised by malware.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly disclosed. Requires local access to device (physical or via malware).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 15.5.1

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for 'JW Library' 3. Tap 'Update' if available 4. Alternatively, uninstall and reinstall latest version

🔧 Temporary Workarounds

Disable app or restrict permissions

android

Temporarily disable the app or restrict its storage permissions until patched

adb shell pm disable-user org.jw.jwlibrary.mobile
adb shell pm revoke org.jw.jwlibrary.mobile android.permission.READ_EXTERNAL_STORAGE

🧯 If You Can't Patch

  • Uninstall the vulnerable version and use alternative methods to access content
  • Enable device encryption and strong authentication to limit impact if device is compromised

🔍 How to Verify

Check if Vulnerable:

Check app version in Android Settings > Apps > JW Library > App info

Check Version:

adb shell dumpsys package org.jw.jwlibrary.mobile | grep versionName

Verify Fix Applied:

Verify app version is greater than 15.5.1 in Google Play Store or app settings

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in app logs
  • Path traversal attempts in debug logs

Network Indicators:

  • Not applicable - local vulnerability

SIEM Query:

Not applicable for local Android app vulnerability

🔗 References

📤 Share & Export