Impact
The vulnerability resides in Twitch Studio’s privileged helper, an XPC service that lacks proper authorization checks. By calling the installFromPath:toPath:withReply: method, a local attacker can overwrite arbitrary files, including system binaries, thereby achieving execution of arbitrary code with root privileges. The weakness is classified as Missing Authorization (CWE‑862).
Affected Systems
Twitch Studio version 0.114.8 and earlier are affected. The application was discontinued in May 2024, but the vulnerability remains in any existing installations of these versions. Users should verify whether the software is present on their systems.
Risk and Exploitability
The CVSS score of 8.5 signals a high severity potential. The EPSS score is below 1 %, indicating low likelihood of large‑scale exploitation. Based on the description, it is inferred that local attackers who can run applications on the affected system can invoke the unprotected XPC method and thus obtain root privileges. The vulnerability is not found in the CISA KEV catalog, meaning it has not yet been widely reported in the wild. Because no patch is currently available, users must rely on removal or other defensive controls.
OpenCVE Enrichment