Description
The issue was addressed with improved checks. This issue is fixed in Xcode 26. Processing an overly large path value may crash a process.
Published: 2025-09-15
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Application Crash / Denial of Service
Action: Apply Patch
AI Analysis

Impact

The vulnerability arose because Xcode did not validate the length of incoming path strings before using them in its internal processes. As a result, an attacker could supply an excessively long path value that would trigger a crash in one of Xcode's components. The crash leads to a denial of service for the developer or build environment using that instance of Xcode, representing a high likelihood of availability impact. The weakness is a classic input validation flaw (CWE-20).

Affected Systems

The issue affects Apple Xcode versions prior to Xcode 26. Apple indicated that the problem is fixed in Xcode 26, so any builds and deployments using Xcode 25 or earlier are potentially vulnerable.

Risk and Exploitability

The CVSS score of 7.5 indicates a high severity. The EPSS score of < 1% suggests that, at present, exploitation probability is very low, and the vulnerability is not listed in the CISA KEV catalog. While the description does not specify how an attacker might supply an excessively long path, it is inferred that the attack requires the ability to provide an oversized path that Xcode processes, such as through a maliciously crafted file name or project file. Because the crash occurs only when Xcode processes an overly long path string, the attack requires that an attacker can supply a file path that Xcode will process. In a typical development or build environment, this could be achieved via injection of a malformed file or by manipulating a project file that Xcode reads. Although the surface is limited, patching remains the most reliable mitigant.

Generated by OpenCVE AI on April 28, 2026 at 10:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Xcode to version 26 or later, where revised checks prevent the crash.
  • If an upgrade is not immediately feasible, ensure that any file paths passed to Xcode are validated to be within acceptable length limits before invocation.
  • Monitor Xcode logs for unexpected crashes and verify that no service is impacted during build processes.

Generated by OpenCVE AI on April 28, 2026 at 10:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29297 The issue was addressed with improved checks. This issue is fixed in Xcode 26. Processing an overly large path value may crash a process.
History

Tue, 28 Apr 2026 11:00:00 +0000

Type Values Removed Values Added
Title Crash from Overly Large Path Values in Xcode

Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Tue, 16 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Tue, 16 Sep 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple xcode
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple xcode
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}


Mon, 15 Sep 2025 22:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in Xcode 26. Processing an overly large path value may crash a process.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:21:11.160Z

Reserved: 2025-04-16T15:24:37.115Z

Link: CVE-2025-43375

cve-icon Vulnrichment

Updated: 2025-09-16T13:36:51.401Z

cve-icon NVD

Status : Modified

Published: 2025-09-15T23:15:39.013

Modified: 2025-11-03T19:16:05.653

Link: CVE-2025-43375

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses