CVE-2026-20625Path Traversal in Apple Macos

CWE-22Path Traversal8 documents5 sources
Severity
5.5MEDIUMNVD
EPSS
0.0%
top 99.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 11
Latest updateFeb 12

Description

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to access sensitive user data.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5apple/macos< 14.8.4+2
NVDapple/macos14.014.8.4+2
CVEListV5apple/visionos< 26.3
NVDapple/visionos< 26.3

🔴Vulnerability Details

2
GHSA
GHSA-qg96-wxg3-3x3h: A parsing issue in the handling of directory paths was addressed with improved path validation2026-02-12
CVEList
CVE-2026-20625: A parsing issue in the handling of directory paths was addressed with improved path validation2026-02-11

📋Vendor Advisories

4
Apple
CVE-2026-20625: visionOS 26.32026-02-11
Apple
CVE-2026-20625: macOS Sequoia 15.7.42026-02-11
Apple
CVE-2026-20625: macOS Sonoma 14.8.42026-02-11
Apple
CVE-2026-20625: macOS Tahoe 26.32026-02-11

🕵️Threat Intelligence

1
Wiz
CVE-2026-20625 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-20625 — Path Traversal in Apple Macos | cvebase