CVE-2026-28827

CWE-22Path Traversal4 documents4 sources
Severity
9.3CRITICAL
EPSS
0.0%
top 96.79%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25

Description

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4. An app may be able to break out of its sandbox.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:HExploitability: 2.5 | Impact: 6.0

Affected Packages2 packages

CVEListV5apple/macos< 14.8.5+2
NVDapple/macos14.014.8.5+2

🔴Vulnerability Details

2
CVEList
CVE-2026-28827: A parsing issue in the handling of directory paths was addressed with improved path validation2026-03-25
GHSA
GHSA-4546-p244-689v: A parsing issue in the handling of directory paths was addressed with improved path validation2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-28827 Impact, Exploitability, and Mitigation Steps | Wiz