Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data.
Published: 2025-11-21
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local confidential data exposure via directory traversal
Action: Patch Now
AI Analysis

Impact

A parsing issue in the handling of directory paths was identified and addressed by adding stricter path validation. The flaw permits a local application to resolve a file reference to a location outside the intended directory, potentially revealing sensitive user data. This classic directory traversal weakness (CWE-22) can expose confidential information if an attacker can run or otherwise influence a local app.

Affected Systems

The vulnerability affects Apple macOS, specifically versions prior to macOS Sequoia 15.5, macOS Sonoma 14.7.3, and macOS Ventura 13.7.3. These releases include the fix; any earlier releases remain vulnerable.

Risk and Exploitability

The CVSS score of 5.5 reflects moderate severity, and the EPSS score of less than 1 % indicates a low probability of exploitation on the current network landscape. The vulnerability is not currently listed in the CISA KEV catalog, but it remains a local risk: an attacker who can run or influence a local application can potentially read or tamper with protected files outside the intended directories. Without the mitigations, the impact is limited to confidentiality potentially compromised for the vulnerable user.

Generated by OpenCVE AI on April 29, 2026 at 02:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update macOS to macOS Sequoia 15.5 or newer, macOS Sonoma 14.7.3 or newer, or macOS Ventura 13.7.3 or newer, ensuring the latest patches are installed.
  • For custom applications that perform path resolution, add explicit path validation checks to ensure that resolved paths remain within the intended directory before accessing files, thereby reducing the risk of directory traversal even if a future flaw emerges.
  • Keep System Integrity Protection and Gatekeeper enabled to limit the ability of local applications to exploit directory traversal weaknesses.

Generated by OpenCVE AI on April 29, 2026 at 02:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 02:30:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Allowing Local Sensitive Data Access

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.5, macOS Sonoma 14.7.3. An app may be able to access sensitive user data. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.5, macOS Sonoma 14.7.3, macOS Ventura 13.7.3. An app may be able to access sensitive user data.

Wed, 26 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Sun, 23 Nov 2025 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 21:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.5, macOS Sonoma 14.7.3. An app may be able to access sensitive user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:14:23.375Z

Reserved: 2025-03-27T16:13:58.328Z

Link: CVE-2025-31248

cve-icon Vulnrichment

Updated: 2025-11-23T11:30:48.234Z

cve-icon NVD

Status : Modified

Published: 2025-11-21T22:16:19.553

Modified: 2026-04-02T19:19:54.800

Link: CVE-2025-31248

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:15:47Z

Weaknesses