CVE-2025-62185
📋 TL;DR
This vulnerability allows attackers to execute arbitrary code by embedding malicious YouTube downloader executables in shared Anki decks. When users import these decks and click YouTube links, the embedded executable runs with the user's privileges. All Anki users who import shared decks are affected.
💻 Affected Systems
- Ankitects Anki
📦 What is this software?
Anki by Ankitects
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise through arbitrary code execution, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Malware execution leading to credential theft, cryptocurrency mining, or data exfiltration from the user's system.
If Mitigated
No impact if users only use trusted decks or have updated to patched versions.
🎯 Exploit Status
Requires social engineering to trick users into importing malicious decks. The vulnerability is in how Anki handles embedded executables for YouTube links.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 25.02.5 and later
Vendor Advisory: https://github.com/ankitects/anki/compare/25.02.4...25.02.5
Restart Required: No
Instructions:
1. Open Anki. 2. Go to Help > Check for Updates. 3. Follow prompts to update to version 25.02.5 or later. 4. Alternatively, download latest version from ankiweb.net.
🔧 Temporary Workarounds
Disable automatic media downloads
allPrevent Anki from automatically downloading and executing YouTube downloader executables
Use only trusted decks
allOnly import decks from verified, reputable sources
🧯 If You Can't Patch
- Only use decks from trusted sources and verify contents before importing
- Run Anki in sandboxed environment or with restricted permissions
🔍 How to Verify
Check if Vulnerable:
Check Anki version in Help > About. If version is below 25.02.5, you are vulnerable.
Check Version:
On Windows: anki --version; On macOS/Linux: anki --version or check Help > About in GUI
Verify Fix Applied:
After updating, verify version is 25.02.5 or higher in Help > About.
📡 Detection & Monitoring
Log Indicators:
- Execution of youtube-dl.exe, yt-dlp.exe, or yt-dlp_x86.exe from Anki media folder
- Unexpected process creation from Anki directory
Network Indicators:
- Unexpected outbound connections from Anki process to unknown domains
SIEM Query:
Process Creation where (Image contains 'youtube-dl' OR Image contains 'yt-dlp') AND ParentImage contains 'anki'