Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to access sensitive user data.
Published: 2026-02-11
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Potential Sensitive Data Exposure
Action: Patch Update
AI Analysis

Impact

A parsing issue in directory path handling caused inadequate validation and allowed applications to access files and directories beyond their intended scope. The flaw is a classic directory traversal weakness, classified as CWE‑22, that may enable an attacker to read or otherwise interact with sensitive user data. The vulnerability was fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, and visionOS 26.3 through improved path‑validation logic.

Affected Systems

The affected vendors are Apple, impacting macOS and visionOS. Specific product versions lacking the fix include all releases of macOS Sequoia, Sonoma, and Tahoe prior to 15.7.4, 14.8.4, and 26.3 respectively, as well as visionOS versions prior to 26.3.

Risk and Exploitability

The CVSS score of 5.5 places the issue in the medium severity range, and the EPSS score of less than 1 % indicates a very low probability of exploitation at the time of this analysis. It is not listed in CISA’s KEV catalog, reflecting a low or no documented exploitation. The likely attack vector is local; an application—whether malicious or compromised—may abuse the flaw to read protected user files. No remote exploitation path is explicitly documented. The weakness’s nature limits impact to data confidentiality within the local system context, but any compromise of user data can have significant privacy implications.

Generated by OpenCVE AI on April 16, 2026 at 00:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest macOS or visionOS update, ensuring at least macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, or visionOS 26.3 is installed.
  • Reboot the device after the update to fully activate the new path‑validation logic.
  • Restrict application sandbox permissions to the minimum directories required, and monitor system logs for anomalous file access attempts.

Generated by OpenCVE AI on April 16, 2026 at 00:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 16 Apr 2026 01:15:00 +0000

Type Values Removed Values Added
Title Directory Traversal Allowing Local Apps to Access Sensitive User Data

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to access sensitive user data. A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to access sensitive user data.

Thu, 12 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*

Thu, 12 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Apple visionos
Vendors & Products Apple
Apple macos
Apple visionos

Wed, 11 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to access sensitive user data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:26:12.051Z

Reserved: 2025-11-11T14:43:07.860Z

Link: CVE-2026-20625

cve-icon Vulnrichment

Updated: 2026-02-12T17:50:25.737Z

cve-icon NVD

Status : Modified

Published: 2026-02-11T23:16:05.977

Modified: 2026-04-02T19:21:12.053

Link: CVE-2026-20625

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T01:00:19Z

Weaknesses