Impact
A parsing error in the way directory paths are handled enables an application to bypass its intended sandbox and read files that it should not normally access. The flaw allows a malicious or compromised app to reference files outside the app’s directory, potentially exposing personal data, credentials, or other sensitive information. This vulnerability is a form of access‑control failure (CWE‑284).
Affected Systems
Apple iOS, iPadOS, macOS, and visionOS versions released before the patches in iOS 18.7.7, iOS 26.4, iPadOS 18.7.7, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4 are affected. The specific fixes are present only in the versions listed above and later releases.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.5, indicating a high level of severity, but the probability of exploitation is low (EPSS < 1 %) and it is not included in the CISA KEV catalog. Exploitability requires an app that can invoke the flawed path parsing logic, which means the threat is primarily local to the device and depends on the installation of malicious or compromised software. If exploited, the primary impact is a confidentiality breach whereby sensitive files become accessible to the attacker. No remote exploitation vector is documented, so the overall risk is significant but the likelihood remains modest.
OpenCVE Enrichment