Description
A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.2. An app may be able to access user-sensitive data.
Published: 2026-02-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential unauthorized access to user‑sensitive data
Action: Update macOS
AI Analysis

Impact

This vulnerability is a path handling issue in macOS that permits an application to resolve file paths leading to user‑sensitive data. The flaw corresponds to CWE‑22 and can result in a confidentiality breach if an app accesses files it should not normally read. The vulnerability does not grant execution privileges or system takeover, but it enables read access to protected resources.

Affected Systems

Apple macOS is affected, specifically versions earlier than macOS Sonoma 14.8.4 and macOS Tahoe 26.2. Any system running these revisions that allows third‑party applications is potentially vulnerable.

Risk and Exploitability

The CVSS score of 5.5 rates the vulnerability as moderate, while the EPSS score of less than 1% indicates a very low probability that it will be exploited in the wild. The issue is not listed in the CISA KEV catalog, implying no known active exploitation. The likely attack vector is a local or remote application that can provide or manipulate file paths, but the description does not confirm an active exploit. Therefore, the risk is moderate to low and mainly relevant to environments that require strict data protection.

Generated by OpenCVE AI on April 22, 2026 at 20:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to version 14.8.4 of Sonoma or 26.2 of Tahoe or later, which contain the corrected path‑handling logic.
  • If an immediate upgrade is not possible, restrict the installation of untrusted or third‑party applications, and enforce app‑sandboxing controls to prevent filesystem traversal.
  • Monitor system logs and application behavior for anomalous file‑access attempts that might indicate path traversal attempts, and investigate any such events promptly.

Generated by OpenCVE AI on April 22, 2026 at 20:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Title macOS Path Traversal Allows App Access to User‑Sensitive Data

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4. An app may be able to access user-sensitive data. A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.2. An app may be able to access user-sensitive data.
References

Fri, 13 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Wed, 11 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4. An app may be able to access user-sensitive data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:18:09.426Z

Reserved: 2025-04-16T15:24:37.123Z

Link: CVE-2025-43417

cve-icon Vulnrichment

Updated: 2026-02-12T16:46:40.589Z

cve-icon NVD

Status : Modified

Published: 2026-02-11T23:16:02.200

Modified: 2026-04-02T19:20:43.050

Link: CVE-2025-43417

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:15:20Z

Weaknesses