Description
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious app may be able to create symlinks to protected regions of the disk.
Published: 2025-03-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via symlink abuse
Action: Immediate Patch
AI Analysis

Impact

The flaw stems from inadequate validation of symbolic links by the macOS file system. An application that is able to run on the machine can create symlinks that point to system‑protected regions. If such a symlink is later used by a privileged process, the attacker can read, modify, or overwrite critical files, effectively enabling remote code execution or privilege escalation. This weakness corresponds to CWE‑59, dangling symlink exploitation.

Affected Systems

Apple macOS operating systems are affected, including all releases older than Sequoia 15.4, Sonoma 14.7.5, and Ventura 13.7.5. The issue was fixed in those releases and later.

Risk and Exploitability

The CVSS score of 9.8 highlights a severe risk. The EPSS score of less than 1 % indicates low current exploitation probability, and the flaw is not listed in CISA’s KEV catalog. Because the vulnerability requires a malicious application that has permission to create symlinks, the most likely attack vector is local installation of malware, though a compromised application could propagate the exploit unnoticed. Once a valid symlink points to a protected file, privileged processes that follow it can be hijacked, providing widespread control over the affected system.

Generated by OpenCVE AI on April 28, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5 or later to apply the symlink validation fix.
  • Limit user privileges so that only trusted administrators can run applications capable of creating symlinks in protected directories, and enforce Gatekeeper or MDM policies to block unknown apps.
  • Enable file‑system auditing for symlink creation and monitor for anomalous symlink paths pointing to system resources.

Generated by OpenCVE AI on April 28, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8905 This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to create symlinks to protected regions of the disk.
History

Tue, 28 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Title Symlink Validation Exploit Allows Unauthorized Disk Access in macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to create symlinks to protected regions of the disk. This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. A malicious app may be able to create symlinks to protected regions of the disk.

Mon, 03 Nov 2025 22:30:00 +0000


Fri, 04 Apr 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Tue, 01 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 22:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to create symlinks to protected regions of the disk.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:18:18.894Z

Reserved: 2025-03-22T00:04:43.720Z

Link: CVE-2025-30457

cve-icon Vulnrichment

Updated: 2025-11-03T21:15:46.850Z

cve-icon NVD

Status : Modified

Published: 2025-03-31T23:15:27.213

Modified: 2026-04-02T19:19:40.467

Link: CVE-2025-30457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T03:00:10Z

Weaknesses