Description
An injection issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.
Published: 2025-12-12
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data access
Action: Patch Update
AI Analysis

Impact

An injection flaw in macOS allows an application to read sensitive user data that it should not be able to access. The vulnerability is categorized as a Command Injection (CWE-95) and is mitigated through enhanced input validation in the patched build. If exploited, an attacker could gain local access to confidential files or personal information, undermining the confidentiality of the affected user’s system.

Affected Systems

Apple’s macOS platform is impacted, specifically versions released before the 26.1 update of the macOS Tahoe release. The fix is embedded in macOS Tahoe 26.1, meaning all earlier builds of this release are vulnerable. User systems running any pre‑26.1 macOS through an independent channel, such as OTA updates or device imagery lacking the patch, will remain at risk until they are upgraded.

Risk and Exploitability

The reported CVSS score of 5.5 denotes a moderate risk, and the EPSS score of less than 1% suggests a low probability of current active exploitation. The vulnerability is not listed in the CISA KEV catalog. Based on the nature of the flaw, the attack vector is most likely local—the exploiter needs to execute a malicious application or inject data via a local application that can trigger the command by leveraging the validation weakness. No remote code execution or external network-based exploitation is indicated by the available data.

Generated by OpenCVE AI on April 22, 2026 at 20:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to version 26.1 of macOS Tahoe or any later release that contains the patch
  • Restrict installation of applications from untrusted or unknown sources to minimize potential injection points
  • Audit and revoke sandbox permissions so that applications do not have read access to sensitive user data unless explicitly required

Generated by OpenCVE AI on April 22, 2026 at 20:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
History

Mon, 15 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Mon, 15 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-95
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Vendors & Products Apple
Apple macos
Apple macos Tahoe

Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description An injection issue was addressed with improved validation. This issue is fixed in macOS Tahoe 26.1. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:23:17.459Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43466

cve-icon Vulnrichment

Updated: 2025-12-15T14:49:20.475Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-12T21:15:54.803

Modified: 2025-12-15T22:07:01.293

Link: CVE-2025-43466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:45:27Z

Weaknesses