Impact
An attacker can supply a specially crafted file during the import feature of Tinybeans Private Family Album App, allowing them to overwrite essential internal files. The overwrite can trigger execution of arbitrary code or leak sensitive data, making this a serious flaw identified as CWE‑73. The vulnerability is rated with a CVSS score of 8.4, indicating a high severity risk.
Affected Systems
The flaw affects Tinybeans’ Private Family Album App version 5.9.5‑prod. Users running this build on Android devices are at risk, while later releases that have addressed the flaw are not vulnerable. No other vendor or product variants are listed.
Risk and Exploitability
Although the exploit probability is low (EPSS <1 %) and the flaw is not listed in the CISA KEV catalog, the potential for code execution makes it a high‑impact concern. The likely attack path involves delivering a crafted file to the app, which then processes the file and allows path traversal to overwrite protected resources. If users import content from an untrusted source, the vulnerability can be triggered without additional privileges.
OpenCVE Enrichment