Description
The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.4. An app may be able to break out of its sandbox.
Published: 2025-05-12
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Sandbox Escape
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an improper access control flaw (CWE‑284) that allows an application running inside the macOS sandbox to breach its confinement. An attacker who can run or influence the affected application could gain privileges beyond the sandbox, compromise system integrity, and potentially access or modify protected data.

Affected Systems

The flaw affects macOS environments running versions prior to macOS Sequoia 15.4, as the issue is addressed in that release. Users of these earlier macOS versions are potentially exposed.

Risk and Exploitability

The CVSS score of 6.3 indicates a moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that exploitation would be local and require execution of the compromised sandboxed application, making it less likely to be leveraged remotely.

Generated by OpenCVE AI on April 28, 2026 at 01:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to macOS Sequoia 15.4 or later to apply the vendor patch that adds the missing logic and restricts sandbox escape.
  • If an upgrade is not immediately feasible, limit the privileges and capabilities of sandboxed applications to the minimum required, effectively reducing the attack surface.
  • Enable and regularly review system and application logs for signs of unexpected privilege escalation or sandbox breaches, and respond promptly to any anomalies.

Generated by OpenCVE AI on April 28, 2026 at 01:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-14783 The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.4. An app may be able to break out of its sandbox.
References
History

Tue, 28 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Sandbox Breakout via Missing Access Control in macOS

Tue, 27 May 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple macos

Wed, 14 May 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed by adding additional logic. This issue is fixed in macOS Sequoia 15.4. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:17:27.184Z

Reserved: 2025-03-27T16:13:58.313Z

Link: CVE-2025-31195

cve-icon Vulnrichment

Updated: 2025-05-14T13:25:04.496Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-12T22:15:21.363

Modified: 2025-05-27T13:57:41.770

Link: CVE-2025-31195

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:00:15Z

Weaknesses