Description
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.4-beta-1f46165, ClearanceKit's Endpoint Security event handler only checked the source path of dual-path file operations against File Access Authorization (FAA) rules and App Jail policies. The destination path was ignored entirely. This allowed any local process to bypass file-access protection by using rename, link, copyfile, exchangedata, or clone operations to place or replace files inside protected directories. This vulnerability is fixed in 5.0.4-beta-1f46165.
Published: 2026-04-10
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized file operation / policy bypass
Action: Apply patch
AI Analysis

Impact

The vulnerability resides in ClearanceKit’s handling of dual‑path Endpoint Security events. The handler checks only the source path of file operations such as rename, link, copyfile, exchangedata, and clone, while ignoring the destination path. This oversight allows any local process to place or overwrite files in protected directories by leveraging those operations, effectively bypassing the intended per‑process access controls. The consequence is that a compromised or malicious local process can inject files into sandboxed locations, potentially enabling further exploitation or persistence.

Affected Systems

The affected product is ClearanceKit, developed by craigjbass for macOS. All releases prior to 5.0.4‑beta‑1f46165 are vulnerable. The patch introduced in 5.0.4‑beta‑1f46165 corrects the policy enforcement logic to evaluate both source and destination paths.

Risk and Exploitability

The CVSS score is 6.8, indicating moderate severity, and the EPSS score is not available. The vulnerability is not listed in CISA’s KEV catalog, suggesting no public exploit evidence yet. A local attacker can exploit the flaw by executing any of the supported file operations against protected directories; the attack vector is inferred to be local because it requires a process running on the same system. Successful exploitation permits the attacker to alter critical files or introduce malicious artifacts, potentially leading to privilege escalation or persistence depending on the protected directories involved.

Generated by OpenCVE AI on April 10, 2026 at 21:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ClearanceKit to version 5.0.4‑beta‑1f46165 or later.

Generated by OpenCVE AI on April 10, 2026 at 21:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Craigjbass
Craigjbass clearancekit
Vendors & Products Craigjbass
Craigjbass clearancekit

Fri, 10 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.4-beta-1f46165, ClearanceKit's Endpoint Security event handler only checked the source path of dual-path file operations against File Access Authorization (FAA) rules and App Jail policies. The destination path was ignored entirely. This allowed any local process to bypass file-access protection by using rename, link, copyfile, exchangedata, or clone operations to place or replace files inside protected directories. This vulnerability is fixed in 5.0.4-beta-1f46165.
Title ClearanceKit has a policy bypass via dual-path Endpoint Security events checking only source path
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Craigjbass Clearancekit
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-15T15:12:11.855Z

Reserved: 2026-04-09T20:59:17.620Z

Link: CVE-2026-40191

cve-icon Vulnrichment

Updated: 2026-04-15T15:12:00.493Z

cve-icon NVD

Status : Deferred

Published: 2026-04-10T21:16:27.440

Modified: 2026-04-16T14:45:19.723

Link: CVE-2026-40191

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T12:57:22Z

Weaknesses