Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to gain root privileges.
Published: 2025-03-31
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Root Privilege Escalation
Action: Patch Update
AI Analysis

Impact

The vulnerability is a parsing flaw in directory path handling that can allow an application to gain root privileges. It represents an access control weakness (CWE-276) where incorrect permissions enable an attacker to execute code with System level authority. The loss of privilege can compromise the entire operating system, allowing modification of system files and services.

Affected Systems

Apple macOS users running any release older than macOS Sequoia 15.4, macOS Sonoma 14.7.5, or macOS Ventura 13.7.5 are affected. The flaw is present in all prior versions of these macOS releases.

Risk and Exploitability

The CVSS score of 7.8 indicates a high severity, and the EPSS score of less than 1% shows a low current exploitation probability. The vulnerability is not currently listed in CISA’s KEV catalog. Based on the description, the likely attack vector is a local or privileged application exploiting the path parsing flaw; it is inferred that a malicious app could use crafted paths to execute privileged code.

Generated by OpenCVE AI on April 28, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to macOS Sequoia 15.4 or later
  • Upgrade to macOS Sonoma 14.7.5 or later
  • Upgrade to macOS Ventura 13.7.5 or later
  • Avoid running untrusted applications, particularly those that may use unusual directory paths
  • Enable Gatekeeper to restrict app installation to verified developers

Generated by OpenCVE AI on April 28, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8947 A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges.
History

Tue, 28 Apr 2026 03:45:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Flaw Allowing Root Privileges

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to gain root privileges.

Mon, 03 Nov 2025 22:30:00 +0000


Fri, 04 Apr 2025 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Wed, 02 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 02 Apr 2025 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-276
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to gain root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:07:33.956Z

Reserved: 2025-01-17T00:00:45.019Z

Link: CVE-2025-24277

cve-icon Vulnrichment

Updated: 2025-11-03T21:12:18.902Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:24.103

Modified: 2026-04-02T19:19:32.023

Link: CVE-2025-24277

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:30:19Z

Weaknesses