CVE-2026-28876

Severity
7.5HIGH
EPSS
0.1%
top 84.39%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25

Description

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4. An app may be able to access sensitive user data.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

CVEListV5apple/macos< 14.8.5+2
NVDapple/macos14.014.8.5+2
NVDapple/ipados26.026.4+1
CVEListV5apple/ios_and_ipados< 18.7.7+1
CVEListV5apple/visionos< 26.4

🔴Vulnerability Details

2
CVEList
CVE-2026-28876: A parsing issue in the handling of directory paths was addressed with improved path validation2026-03-25
GHSA
GHSA-xp9f-jj97-j8gx: A parsing issue in the handling of directory paths was addressed with improved path validation2026-03-25

🕵️Threat Intelligence

1
Wiz
CVE-2026-28876 Impact, Exploitability, and Mitigation Steps | Wiz