Description
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Tahoe 26.1. An app may be able to access protected user data.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Access to protected user data
Action: Update macOS
AI Analysis

Impact

This vulnerability arises from insufficient validation of symbolic links in macOS. The flaw allows any application to read files that it normally could not access, such as protected user data, leveraging the improper handling of symlinks. The weakness maps to CWE‑59, which describes absolute path traversal via symlink manipulation. The potential impact is a confidentiality breach where sensitive files become readable by malicious or compromised applications.

Affected Systems

Apple macOS is affected. The issue is fixed in macOS Tahoe version 26.1. All earlier releases lacking the patch are potentially vulnerable, including any macOS build prior to that point.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate severity. The EPSS score is below 1%, representing a low probability of exploitation at present, and the vulnerability has not been reported in the CISA KEV catalog. The likely attack vector is local, requiring an app to be executed on the vulnerable machine; no remote exploitation is indicated by the current description. The combination of moderate risk and low exploitation probability suggests that patching is prudent but the threat level is manageable for today.

Generated by OpenCVE AI on April 22, 2026 at 20:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to version 26.1 (Tahoe) or later, which contains the fix for symlink validation.
  • Avoid installing or executing applications from untrusted or unknown sources until the system is patched.
  • Maintain a regular update schedule for macOS and all installed software to ensure any related security patches are promptly applied.

Generated by OpenCVE AI on April 22, 2026 at 20:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Wed, 22 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Title Improved Symlink Validation Allows Access to Protected User Data on macOS

Mon, 15 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Mon, 15 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-59
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Tahoe 26.1. An app may be able to access protected user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:20:27.305Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43461

cve-icon Vulnrichment

Updated: 2025-12-15T13:39:31.472Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-12T21:15:54.410

Modified: 2025-12-15T22:06:40.040

Link: CVE-2025-43461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:45:27Z

Weaknesses