Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to gain root privileges.
Published: 2025-09-15
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch Immediately
AI Analysis

Impact

A parsing issue in the handling of directory paths was reported. The flaw allows an application to craft a path that bypasses normal validation, leading to unauthorized elevation of privileges to the root level. The weakness is a pathname traversal flaw (CWE‑41) that can compromise system integrity if exploited.

Affected Systems

The flaw affects Apple macOS builds prior to the fixes released in macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26. Any installations older than these versions should be considered vulnerable.

Risk and Exploitability

The reported CVSS score is 7.8, indicating a high‑severity vulnerability, while the EPSS score is below 1 % and the vulnerability is not listed in the CISA KEV catalog, suggesting a low current exploitation probability. Based on the description, the likely attack vector is local, where a trusted or user‑initiated application can supply a crafted path to trigger the failure in path validation and gain root privileges.

Generated by OpenCVE AI on April 27, 2026 at 23:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to macOS Sequoia 15.7 or later, macOS Sonoma 14.8 or later, or macOS Tahoe 26 or later.
  • Enable Gatekeeper and App Sandbox to restrict third‑party applications from accessing privileged system directories without explicit permission.
  • Set up log monitoring to detect unexpected root‑level operations and review system logs for anomalous activity.

Generated by OpenCVE AI on April 27, 2026 at 23:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29272 A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to gain root privileges.
History

Tue, 28 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Allowing Privilege Escalation in macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to gain root privileges. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to gain root privileges.
References

Tue, 04 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to gain root privileges. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to gain root privileges.

Mon, 03 Nov 2025 19:30:00 +0000


Wed, 17 Sep 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe

Tue, 16 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-41
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to gain root privileges.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Tahoe
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:27:05.219Z

Reserved: 2025-04-16T15:24:37.103Z

Link: CVE-2025-43298

cve-icon Vulnrichment

Updated: 2025-11-03T18:10:22.817Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:32.903

Modified: 2026-04-02T19:20:21.950

Link: CVE-2025-43298

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:00:18Z

Weaknesses