Description
The issue was addressed with additional permissions checks. This issue is fixed in Safari 26.2, macOS Tahoe 26.2. An app may be able to access sensitive user data.
Published: 2025-12-17
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to sensitive user data
Action: Immediate Patch
AI Analysis

Impact

The vulnerability stems from missing permission checks that allow an application to read sensitive user data that should be protected by the operating system. This constitutes an improper access control flaw (CWE-284) that can grant an attacker access to private information. The flaw does not lead to code execution or denial of service, but it enables data theft or privacy violations. It is limited to the application’s permitted context and requires the flaw to be triggered by a malicious or compromised app.

Affected Systems

Apple Safari and macOS Tahoe are affected when running versions prior to Safari 26.2 and macOS Tahoe 26.2, respectively. The fix was introduced in those releases, so any earlier builds remain vulnerable. Systems still deploying an earlier Safari or macOS Tahoe version should be considered at risk. No other Apple products are listed as impacted by this issue.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate impact. The EPSS score of less than 1% suggests a low probability of exploitation at present. It is not listed in the CISA KEV catalog, implying that large-scale exploitation has not been reported. The likely attack vector is a malicious application that runs on the device; the attacker would need to install or trick a user into installing such an app. The vulnerability requires local code execution or the ability to run code on the device, so remote exploitation is unlikely without prior compromise or social engineering. The threat remains a moderate risk, primarily related to privacy breaches rather than system compromise.

Generated by OpenCVE AI on April 22, 2026 at 20:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Safari 26.2 or newer and macOS Tahoe 26.2 or newer to include the patched permission checks.
  • If an update is not yet available, disable the application’s ability to request permissions for sensitive data by adjusting its sandbox or permission settings.
  • Monitor for additional advisories or patches from Apple, and reconsider application installations after the update.

Generated by OpenCVE AI on April 22, 2026 at 20:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description The issue was addressed with additional permissions checks. This issue is fixed in macOS Tahoe 26.2, Safari 26.2. An app may be able to access sensitive user data. The issue was addressed with additional permissions checks. This issue is fixed in Safari 26.2, macOS Tahoe 26.2. An app may be able to access sensitive user data.

Thu, 18 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}


Thu, 18 Dec 2025 20:00:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 18 Dec 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple macos Tahoe
Apple safari
Vendors & Products Apple
Apple macos
Apple macos Tahoe
Apple safari

Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description The issue was addressed with additional permissions checks. This issue is fixed in macOS Tahoe 26.2, Safari 26.2. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:08:38.142Z

Reserved: 2025-04-22T21:13:49.958Z

Link: CVE-2025-46282

cve-icon Vulnrichment

Updated: 2025-12-18T19:22:28.710Z

cve-icon NVD

Status : Modified

Published: 2025-12-17T21:16:13.533

Modified: 2026-04-02T19:21:03.177

Link: CVE-2025-46282

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:30:26Z

Weaknesses