Impact
A flaw in the OS path parsing allows a malicious application to resolve file paths that escape the intended sandbox boundaries, exposing local user data. The weakness is a classic relative-path traversal, mapped to CWE‑22, and does not grant code execution but permits compromised confidentiality of files stored on the device.
Affected Systems
The flaw affects Apple iOS and iPadOS versions up to and including 26, macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26, visionOS 26, and watchOS 26. All devices running these operating systems are at risk if they have applications that can exploit the path validation error.
Risk and Exploitability
The CVSS score of 5.5 indicates medium severity, and the EPSS score of less than 1 % indicates low likelihood of exploitation in the wild. The vulnerability is not listed in KEV. An attacker would typically need a malicious or compromised application installed on the device; once executed, the app could read files in directories that the path traversal bypasses. Remote exploitation is unlikely without a pre‑installed payload, so the primary threat is local compromise via malicious apps.
OpenCVE Enrichment
EUVD