Description
The file names constructed within file_selector are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select a document file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.5.1+12. It is recommended to update to the latest version of file_selector_android that contains the changes to address this vulnerability.
Published: 2025-01-29
Score: 2.1 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-52572 The file names constructed within file_selector are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select a document file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.5.1+12. It is recommended to update to the latest version of file_selector_android that contains the changes to address this vulnerability.
History

Wed, 30 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
First Time appeared Flutter
Flutter file Selector Android
Weaknesses CWE-22
CPEs cpe:2.3:a:flutter:file_selector_android:*:*:*:*:*:*:*:*
Vendors & Products Flutter
Flutter file Selector Android
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}


Wed, 29 Jan 2025 12:00:00 +0000

Type Values Removed Values Added
Description The file names constructed within file_selector are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select a document file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.5.1+12. It is recommended to update to the latest version of file_selector_android that contains the changes to address this vulnerability.
Title Unsanitized Filenames in Flutter package file_selector_android Allow File Overwrites
Weaknesses CWE-23
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:N/VI:L/VA:L/SC:N/SI:H/SA:H'}


Subscriptions

Flutter File Selector Android
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-02-12T19:51:14.271Z

Reserved: 2024-12-03T10:16:06.217Z

Link: CVE-2024-54461

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2025-01-29T12:15:28.437

Modified: 2025-07-30T00:05:40.843

Link: CVE-2024-54461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses