Unrated severityNVD Advisory· Published Oct 1, 2013· Updated Apr 29, 2026
CVE-2013-5725
CVE-2013-5725
Description
The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.
Affected products
4cpe:2.3:a:metaclassy:byword:2.0.0:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:metaclassy:byword:2.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:metaclassy:byword:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:metaclassy:byword:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:metaclassy:byword:2.0.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.