Description
A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to read files outside of its sandbox.
Published: 2025-01-27
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch
AI Analysis

Impact

A path handling flaw allows a sandboxed application to read files outside its protected area. The vulnerability results in unintended disclosure of data that the application should not have access to, potentially exposing sensitive system or user files. It is identified as CWE‑125, an out‑of‑bounds read weakness.

Affected Systems

Apple macOS is affected. The flaw exists in all releases of macOS Sequoia earlier than 15.3, Sonoma earlier than 14.7.3, and Ventura earlier than 13.7.3. Updating to any of these or later patched releases removes the vulnerability.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity, and the EPSS score of less than 1% implies a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers would need local execution of a malicious app or to manipulate an existing sandboxed app to gain the ability to read arbitrary files; remote exploitation is unlikely based on the provided information.

Generated by OpenCVE AI on April 28, 2026 at 19:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install macOS Sequoia starting at version 15.3 or later, or Sonoma 14.7.3 or later, or Ventura 13.7.3 or later. The OS update applies the path‑validation fix that prevents the file‑reading attack.
  • Restart the system after applying the OS update to ensure all subsystems recognize the patch.
  • Limit the installation of sandboxed applications to trusted sources and monitor for unknown or malicious apps that could attempt to read restricted files.

Generated by OpenCVE AI on April 28, 2026 at 19:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3627 A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox.
History

Tue, 28 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Title Sandbox Path Traversal Allowing Unauthorized File Access

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox. A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.3, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to read files outside of its sandbox.

Mon, 03 Nov 2025 21:30:00 +0000


Tue, 18 Mar 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Tue, 18 Mar 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Tue, 18 Feb 2025 20:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Tue, 28 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
Description A path handling issue was addressed with improved validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. An app may be able to read files outside of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:12:34.529Z

Reserved: 2025-01-17T00:00:44.970Z

Link: CVE-2025-24115

cve-icon Vulnrichment

Updated: 2025-11-03T21:01:58.970Z

cve-icon NVD

Status : Modified

Published: 2025-01-27T22:15:16.713

Modified: 2026-04-02T19:19:01.720

Link: CVE-2025-24115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:15:25Z

Weaknesses