CVE-2025-15523
Description
MacOS version of Inkscape bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Inkscape, potentially disguising attacker's malicious intent.
This issue has been fixed in 1.4.3 version of Inkscape.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Inkscape for macOS bundles a Python interpreter that inherits the app's TCC permissions, allowing local attackers to access privacy-protected files without user prompts.
Vulnerability
Overview
CVE-2025-15523 affects the macOS version of Inkscape, a popular vector graphics editor. The application bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main Inkscape application bundle. This design flaw means that any script or command executed via this bundled interpreter runs with the same TCC permissions as Inkscape itself, without triggering additional user prompts [1][2].
Exploitation
An attacker with local user access can invoke the bundled Python interpreter to execute arbitrary commands or scripts. Because the interpreter inherits Inkscape's TCC permissions, the attacker can access files in privacy-protected folders (such as Documents, Downloads, Desktop, or camera/microphone) that the user previously authorized for Inkscape. If the attacker attempts to access resources beyond the originally granted permissions, the system will prompt the user for approval—but the prompt appears in the name of Inkscape, potentially disguising the attacker's malicious intent [2].
Impact
Successful exploitation allows an attacker to read, modify, or exfiltruncate, or exfiltrate user files in privacy-protected directories without any additional user interaction or notification. This bypasses macOS's privacy controls and could lead to data theft, surveillance, or further compromise of the user's system. The vulnerability is classified as CWE-276 (Incorrect Default Permissions) and has a CVSS score of Medium [2].
Mitigation
The issue has been fixed in Inkscape version 1.4.3. Users are strongly advised to update to this version or later. No workaround is no known workaround for earlier versions; users should avoid granting TCC permissions to Inkscape until they can upgrade [1][2].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.