Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.
Published: 2025-07-29
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to protected user data
Action: Apply Patch
AI Analysis

Impact

The vulnerability involves a parsing error in directory path handling that can allow a local application to read files marked as protected. It falls under the path traversal or directory traversal category (CWE‑22) and results in a confidentiality breach by exposing user data that should be inaccessible outside the user’s protected environment.

Affected Systems

Affected systems are Apple macOS operating systems. The flaw was remedied in macOS Sequoia 15.6, macOS Sonoma 14.7.7, and macOS Ventura 13.7.7, meaning that earlier releases of the same major versions remain vulnerable until those updates are applied.

Risk and Exploitability

The base CVSS score of 4 indicates moderate severity, while the EPSS score of less than 1% reflects a very low expected exploitation probability. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is local and requires an application to manipulate path parsing; thus an attacker can achieve unauthorized local read access to protected user data mainly through a compromised or malicious local application.

Generated by OpenCVE AI on April 28, 2026 at 10:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest macOS updates that include the path‑validation fix (macOS Sequoia 15.6, macOS Sonoma 14.7.7, or macOS Ventura 13.7.7).
  • For systems unable to receive the update immediately, refrain from installing or running third‑party applications that might be able to traverse directories, and consider removing or disabling the affected app.
  • Enable sandboxing or app confinement for all non‑trusted software to restrict file‑system access and mitigate potential local exploitation.

Generated by OpenCVE AI on April 28, 2026 at 10:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-23075 A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to access protected user data.
History

Tue, 28 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Allowing Access to Protected User Data

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to access protected user data. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7. An app may be able to access protected user data.

Mon, 03 Nov 2025 20:30:00 +0000


Thu, 31 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 30 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Ventura

Wed, 30 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.6, macOS Ventura 13.7.7, macOS Sonoma 14.7.7. An app may be able to access protected user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Ventura
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:34.217Z

Reserved: 2025-04-16T15:24:37.088Z

Link: CVE-2025-43206

cve-icon Vulnrichment

Updated: 2025-07-30T14:26:31.982Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:32.933

Modified: 2026-04-02T19:20:04.540

Link: CVE-2025-43206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T11:00:14Z

Weaknesses