First published: Tue May 14 2024(Updated: )
The WPS Office (aka cn.wps.moffice_eng) application before 17.0.0 for Android fails to properly sanitize file names before processing them through external application interactions, leading to a form of path traversal. This potentially enables any application to dispatch a crafted library file, aiming to overwrite an existing native library utilized by WPS Office. Successful exploitation could result in the execution of arbitrary commands under the guise of WPS Office's application ID.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WPS Office | <17.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35205 is classified as a high severity vulnerability due to its potential impact on user data and device integrity.
To mitigate CVE-2024-35205, users should update to WPS Office version 17.0.0 or later where the vulnerability has been addressed.
CVE-2024-35205 affects WPS Office for Android versions prior to 17.0.0.
CVE-2024-35205 is a path traversal vulnerability that occurs due to inadequate sanitization of file names.
The risks associated with CVE-2024-35205 include unauthorized access to files and the potential execution of malicious code via crafted library files.