Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access sensitive user data.
Published: 2025-09-15
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises from a parsing flaw in the way Apple’s macOS handles directory paths, allowing an application to bypass intended path validation and read files that should be protected. This flaw can lead to disclosure of sensitive user data such as documents, photos, or application credentials.

Affected Systems

Apple macOS is affected. Versions prior to macOS Sequoia 15.7, macOS Sonoma 14.8, and macOS Tahoe 26 contain the flaw; the issue has been fixed in the listed releases.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score is reported as < 1 %, suggesting a low likelihood of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that attackers would need local execution privileges and a malicious or compromised application to exploit the bug; no remote code execution capability is indicated.

Generated by OpenCVE AI on April 28, 2026 at 10:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the operating system to macOS Sequoia 15.7, macOS Sonoma 14.8, or macOS Tahoe 26 to receive the fixed path‑validation logic.
  • If an upgrade cannot be performed immediately, limit the use of applications that parse untrusted file paths and disable any that are not essential or not from trusted sources.
  • Verify that no applications possess unnecessary Full Disk Access or other sensitive permissions that could allow them to exploit the path‑validation flaw.

Generated by OpenCVE AI on April 28, 2026 at 10:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29293 A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access sensitive user data.
History

Tue, 28 Apr 2026 11:00:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Bug Allows Sensitive Data Access

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to access sensitive user data. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access sensitive user data.
References

Tue, 04 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access sensitive user data. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sonoma 14.8, macOS Sequoia 15.7. An app may be able to access sensitive user data.

Mon, 03 Nov 2025 19:30:00 +0000


Wed, 17 Sep 2025 13:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7, macOS Sonoma 14.8, macOS Tahoe 26. An app may be able to access sensitive user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Tahoe
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:46.787Z

Reserved: 2025-04-16T15:24:37.106Z

Link: CVE-2025-43314

cve-icon Vulnrichment

Updated: 2025-11-03T18:11:00.292Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:34.413

Modified: 2026-04-02T19:20:24.583

Link: CVE-2025-43314

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses