A path traversal vulnerability exists in the JW Library App for Android, specifically in the component org.jw.jwlibrary.mobile.activity.SiloContainer. This flaw allows local attackers to manipulate the app's file paths, potentially enabling unauthorized access to sensitive files or directories. Users need to be aware of this vulnerability, as it has been disclosed publicly and may pose risks if exploited.
https://securityvulnerability.io/vulner ... 2025-14617