Impact
A path handling issue in macOS enables an application to delete files for which it does not have permission, a form of informal privilege escalation. The weakness aligns with the CWE-22 classification, describing an improper handling of file paths that can lead to unauthorized file removal. According to the documentation, the flaw has been resolved with stricter validation routines.
Affected Systems
Apple macOS is affected. According to the advisory, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4 contain the fix. Older macOS releases prior to these versions are potentially vulnerable.
Risk and Exploitability
The CVSS base score is 4 and the EPSS score is below 1 %, indicating a moderate severity and low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. While the description does not state the attack vector explicitly, it is inferred to be local, requiring an application to supply a crafted path. An attacker could delete critical system or user files if they can run an app with sufficient privileges, but the low EPSS suggests this exploit is not widely observed.
OpenCVE Enrichment