CVE-2026-20610Link Following in Apple Macos

CWE-59Link Following5 documents5 sources
Severity
7.8HIGHNVD
EPSS
0.0%
top 97.70%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 11
Latest updateFeb 12

Description

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5apple/macos< 26.3
NVDapple/macos< 26.3

🔴Vulnerability Details

2
GHSA
GHSA-w65x-hpv6-vv6v: This issue was addressed with improved handling of symlinks2026-02-12
CVEList
CVE-2026-20610: This issue was addressed with improved handling of symlinks2026-02-11

📋Vendor Advisories

1
Apple
CVE-2026-20610: macOS Tahoe 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20610 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-20610 — Link Following in Apple Macos | cvebase