VYPR
Unrated severityNVD Advisory· Published Oct 1, 2013· Updated Apr 29, 2026

CVE-2013-5725

CVE-2013-5725

Description

The Metaclassy Byword app 2.x before 2.1 for iOS does not require confirmation of Replace file actions, which allows remote attackers to overwrite arbitrary files via the name and text parameters in a byword://replace URL.

Affected products

4
  • Metaclassy/Byword4 versions
    cpe:2.3:a:metaclassy:byword:2.0.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:metaclassy:byword:2.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:metaclassy:byword:2.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:metaclassy:byword:2.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:metaclassy:byword:2.0.3:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.