Description
A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to break out of its sandbox.
Published: 2025-05-29
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Sandbox Escape
Action: Immediate Patch
AI Analysis

Impact

This vulnerability allows an application to bypass the file quarantine mechanism, which can lead to an escape from the application's sandbox. By exploiting this fault, an attacker could potentially gain the privileges granted to the sandboxed app, enabling unauthorized access to system resources. The weakness maps to CWE‑693, indicating a system authorization bypass through improper initialization or configuration checks.

Affected Systems

Apple macOS users running versions prior to Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5 are affected. These systems lack the additional checks that were introduced to reinforce quarantine handling.

Risk and Exploitability

The CVSS score of 8.2 reflects a high severity, while the EPSS score of less than 1% suggests that exploitation is currently unlikely. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is the introduction of a malicious file that is intended to be quarantined; the bypass enables the application to execute code outside its sandbox, potentially leading to privilege escalation or data exfiltration. No public exploitation vectors are currently documented, but the low EPSS indicates a small current threat.

Generated by OpenCVE AI on April 28, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to at least Sequoia 15.4, Sonoma 14.7.5, or Ventura 13.7.5 to receive the patch that adds the missing quarantine checks.
  • If an update is temporarily unavailable, limit the installation of applications from untrusted sources and disable automatic downloads from unknown publishers until the patch can be applied.
  • Enable Gatekeeper to deny non‑App Store or notarized software and enforce the quarantine flag on all downloaded files to reduce the risk of malicious file execution.

Generated by OpenCVE AI on April 28, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-16429 A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox.
History

Tue, 28 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Title File quarantine bypass may enable sandbox escape in macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox. A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5. An app may be able to break out of its sandbox.

Mon, 02 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Fri, 30 May 2025 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 30 May 2025 22:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-693
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}


Thu, 29 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description A file quarantine bypass was addressed with additional checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:11:41.527Z

Reserved: 2025-03-27T16:13:58.312Z

Link: CVE-2025-31189

cve-icon Vulnrichment

Updated: 2025-05-30T14:43:04.824Z

cve-icon NVD

Status : Modified

Published: 2025-05-29T22:15:21.737

Modified: 2026-04-02T19:19:44.583

Link: CVE-2025-31189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:00:20Z

Weaknesses