Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.1. An app may be able to access sensitive user data.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Now
AI Analysis

Impact

A parsing issue in the handling of directory paths was fixed with improved path validation. The flaw, identified as CWE-22, can allow an application to resolve paths to locations outside the intended directory, thereby accessing sensitive user data. The vulnerability is not described as enabling execution or other higher‑level attacks; it primarily risks unintended data disclosure.

Affected Systems

Apple macOS is affected. The issue is fixed in macOS Sequoia 15.7.3, macOS Sonoma 14.8.3 and macOS Tahoe 26.1. Earlier releases of these operating systems remain vulnerable.

Risk and Exploitability

The CVSS score of 5.5 indicates a moderate risk. The EPSS score of less than 1% shows a very low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is local; a malicious or compromised application could take advantage of the path validation bug to access files the user might not intend it to read.

Generated by OpenCVE AI on April 22, 2026 at 20:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install or upgrade to macOS Sequoia 15.7.3, macOS Sonoma 14.8.3 or macOS Tahoe 26.1 where the path validation fix is included.
  • If an update cannot be applied immediately, constrain the application’s file access with sandboxing or by limiting its file‑system permissions in the system’s privacy settings.
  • Review system logs and employ file‑integrity monitoring to detect unusual read attempts on sensitive files.

Generated by OpenCVE AI on April 22, 2026 at 20:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 22 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
Title Directory Path Parsing Vulnerability Allowing Sensitive Data Access

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sonoma 14.8.3, macOS Tahoe 26.1, macOS Sequoia 15.7.3. An app may be able to access sensitive user data. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.3, macOS Sonoma 14.8.3, macOS Tahoe 26.1. An app may be able to access sensitive user data.

Wed, 17 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Sequoia
Apple macos Sonoma
Apple macos Tahoe

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sonoma 14.8.3, macOS Tahoe 26.1, macOS Sequoia 15.7.3. An app may be able to access sensitive user data.
References

Subscriptions

Apple Macos Macos Sequoia Macos Sonoma Macos Tahoe
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:15:35.823Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43463

cve-icon Vulnrichment

Updated: 2025-12-17T20:29:20.175Z

cve-icon NVD

Status : Modified

Published: 2025-12-12T21:15:54.510

Modified: 2026-04-02T19:20:50.527

Link: CVE-2025-43463

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:45:27Z

Weaknesses