Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5. An app may be able to gain root privileges.
Published: 2026-05-11
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A parsing flaw in macOS's handling of directory paths can allow an application to gain root privileges. The flaw arises from inadequate path validation, enabling an attacker to elevate privileges and thus gain full control over the system, compromising confidentiality, integrity, and availability. The vulnerability is a classic privilege‑escalation issue rooted in improper path handling.

Affected Systems

Apple macOS is affected, specifically versions prior to macOS Sequoia 15.7.7, macOS Sonoma 14.8.7 and macOS Tahoe 26.5. These patches contain the fix, so any older releases are potentially vulnerable.

Risk and Exploitability

The CVSS and EPSS scores are not currently available, and the vulnerability is not listed in CISA's KEV catalog. Based on the description it is inferred that the attack vector is local, requiring that the attacker run a malicious or compromised application. The attack could grant full administrative privileges, posing a high‑risk security threat once exploited. Given the lack of publicly documented exploits, the actual exploitation likelihood remains uncertain but the impact of successful exploitation would be catastrophic.

Generated by OpenCVE AI on May 11, 2026 at 22:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade macOS to the latest available version that includes the Sequoia 15.7.7, Sonoma 14.8.7, or Tahoe 26.5 patches or later
  • Restrict installation and execution of untrusted applications to mitigate the local privilege‑escalation risk
  • Continuously monitor system logs for indications of unauthorized privilege escalation or anomalous system activity

Generated by OpenCVE AI on May 11, 2026 at 22:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple macos
Vendors & Products Apple
Apple macos

Mon, 11 May 2026 22:30:00 +0000

Type Values Removed Values Added
Title Privilege Escalation via Improper Directory Path Validation in macOS
Weaknesses CWE-284
CWE-613

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
Description A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5. An app may be able to gain root privileges.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-05-11T20:07:43.126Z

Reserved: 2026-03-03T16:36:03.985Z

Link: CVE-2026-28915

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-11T21:18:54.000

Modified: 2026-05-12T14:13:03.510

Link: CVE-2026-28915

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T23:00:17Z

Weaknesses