Description
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to access protected user data.
Published: 2025-11-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized data access
Action: Apply Patch
AI Analysis

Impact

Based on the description, it is inferred that an app may be able to create or follow a symbolic link that points to a protected file or directory, allowing read access to otherwise restricted data. This flaw is a classic instance of symbolic‑link handling errors classified as CWE‑59. The consequence is that sensitive user data could be exposed to unprivileged applications, potentially leaking personal information.

Affected Systems

Apple macOS is affected, though specific pre‑patch versions are not listed. The vulnerability is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, and macOS Tahoe 26.1. Any Mac running an earlier minor release of any of these code names remains vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity and the EPSS score of less than 1% suggests that exploitation is currently rare. The flaw is not listed in the CISA KEV catalog, further indicating limited public exploitation. Based on the description, it is inferred that the most likely attack vector is local: a malicious or compromised application running on the user’s machine can exploit the symlink flaw to read protected files. Due to the need for the application to run with user privileges, the risk remains limited to the local environment.

Generated by OpenCVE AI on April 27, 2026 at 23:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply macOS updates that include Sequoia 15.7.2, Sonoma 14.8.2, or Tahoe 26.1 releases.
  • Review and adjust application configurations to prevent improper symlink handling or file system access.
  • Implement application sandboxing or permission restrictions to limit read access to protected system directories.

Generated by OpenCVE AI on April 27, 2026 at 23:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Title Symlink Vulnerability Enabling Unprivileged Access to Protected User Data

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to access protected user data. This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to access protected user data.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.8.2, macOS Sequoia 15.7.2. An app may be able to access protected user data. This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to access protected user data.
References

Tue, 04 Nov 2025 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma

Tue, 04 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sonoma 14.8.2, macOS Sequoia 15.7.2. An app may be able to access protected user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:16:15.717Z

Reserved: 2025-04-16T15:24:37.118Z

Link: CVE-2025-43394

cve-icon Vulnrichment

Updated: 2025-11-04T15:43:33.184Z

cve-icon NVD

Status : Modified

Published: 2025-11-04T02:15:46.180

Modified: 2026-04-02T19:20:38.980

Link: CVE-2025-43394

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:30:15Z

Weaknesses