Description
A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to break out of its sandbox.
Published: 2025-11-04
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation via Sandbox Escape
Action: Patch Now
AI Analysis

Impact

A permission misuse in macOS allows an application to bypass its sandbox, enabling unauthorized access to system resources, potentially compromising data integrity and confidentiality.

Affected Systems

Apple macOS is affected, but the issue has been fixed in Sequoia 15.7.2, Sonoma 14.8.2, and Tahoe 26.1; earlier releases prior to these contain the vulnerability.

Risk and Exploitability

The CVSS score of 7.8 indicates a moderate to high severity, while an EPSS score of less than 1% suggests low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be local, where a malicious application or code running with user privileges could break out of its sandbox, potentially escalating privileges within the macOS environment.

Generated by OpenCVE AI on April 27, 2026 at 23:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest macOS security update (Sequoia 15.7.2, Sonoma 14.8.2, Tahoe 26.1).
  • Use Gatekeeper to restrict application installation to trusted sources.
  • Monitor for abnormal sandbox behavior and employ macOS quarantine features for untrusted applications.

Generated by OpenCVE AI on April 27, 2026 at 23:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 23:30:00 +0000

Type Values Removed Values Added
Title Sandbox Escape via Permission Misuse in macOS

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to break out of its sandbox. A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.2, macOS Sonoma 14.8.2, macOS Tahoe 26.1. An app may be able to break out of its sandbox.

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.8.2, macOS Sequoia 15.7.2. An app may be able to break out of its sandbox. A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sequoia 15.7.2, macOS Tahoe 26.1, macOS Sonoma 14.8.2. An app may be able to break out of its sandbox.
References

Wed, 05 Nov 2025 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Tue, 04 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Tue, 04 Nov 2025 01:45:00 +0000

Type Values Removed Values Added
Description A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Sonoma 14.8.2, macOS Sequoia 15.7.2. An app may be able to break out of its sandbox.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:19:58.789Z

Reserved: 2025-04-16T15:24:37.126Z

Link: CVE-2025-43476

cve-icon Vulnrichment

Updated: 2025-11-04T18:08:32.763Z

cve-icon NVD

Status : Modified

Published: 2025-11-04T02:15:52.010

Modified: 2026-04-02T19:20:52.493

Link: CVE-2025-43476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T23:15:06Z

Weaknesses