Impact
Based on the description, it is inferred that an app may be able to create or follow a symbolic link that points to a protected file or directory, allowing read access to otherwise restricted data. This flaw is a classic instance of symbolic‑link handling errors classified as CWE‑59. The consequence is that sensitive user data could be exposed to unprivileged applications, potentially leaking personal information.
Affected Systems
Apple macOS is affected, though specific pre‑patch versions are not listed. The vulnerability is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, and macOS Tahoe 26.1. Any Mac running an earlier minor release of any of these code names remains vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity and the EPSS score of less than 1% suggests that exploitation is currently rare. The flaw is not listed in the CISA KEV catalog, further indicating limited public exploitation. Based on the description, it is inferred that the most likely attack vector is local: a malicious or compromised application running on the user’s machine can exploit the symlink flaw to read protected files. Due to the need for the application to run with user privileges, the risk remains limited to the local environment.
OpenCVE Enrichment