Impact
The vulnerability allows a user with administrator privileges on macOS to elevate their rights to root during the installation or upgrade of Mullvad VPN versions 2026.1 and earlier. The installer executes binaries from the /Applications/Mullvad VPN.app bundle without verifying that the bundle is the legitimate Mullvad application or that it has not been tampered with. A crafted application bundle placed at that location can execute arbitrary code with root privileges, violating confidentiality, integrity, and availability of the system.
Affected Systems
Affected product: Mullvad VPN application for macOS. Versions up to and including 2026.1 are impacted. The issue was fixed in version 2026.2‑beta1.
Risk and Exploitability
The CVSS score of 7.3 indicates a high severity local privilege escalation risk. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not actively exploited in the wild. The exploitation path requires a local admin to install or upgrade the app, making it a local attack vector. An attacker can pre‑place a malicious bundle at /Applications/Mullvad VPN.app prior to installation or upgrade to achieve code execution as root.
OpenCVE Enrichment