VYPR
Medium severityNVD Advisory· Published Aug 15, 2025· Updated Apr 15, 2026

CVE-2025-7961

CVE-2025-7961

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Wulkano KAP on MacOS allows TCC Bypass.This issue affects KAP: 3.6.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

KAP 3.6.0 on macOS contains a Node.js misconfiguration allowing code injection via ELECTRON_RUN_AS_NODE or --inspect, enabling TCC bypass and unauthorized audio/video capture.

Vulnerability

Overview

CVE-2025-7961 describes a code injection vulnerability in Wulkano KAP versions prior to 3.6.0 on macOS. The root cause is a misconfiguration in the Node.js environment settings, which allows an attacker to inject and execute arbitrary code by manipulating the ELECTRON_RUN_AS_NODE environment variable or by using the --inspect option. This improper control of code generation bypasses the application's intended security boundaries [1].

Exploitation

An attacker with local access or the ability to influence the application's environment can exploit this flaw. By setting the ELECTRON_RUN_AS_NODE variable or enabling the --inspect flag, the attacker can execute arbitrary JavaScript code within the Electron process. No authentication is required beyond the ability to modify environment variables or command-line arguments, which may be achievable through other local exploits or social engineering [1].

Impact

Successful exploitation allows the attacker to bypass macOS's Transparency, Consent, and Control (TCC) mechanism. This enables unauthorized capture of audio or video without the user's knowledge or consent, compromising system privacy. The vulnerability is rated Medium severity due to the requirement for local access and the potential for privacy violations [1].

Mitigation

As of the advisory date, no patch is available for this vulnerability. Users are advised to monitor for updates from the vendor or consider restricting execution of KAP until a fix is released. The project is open-source and hosted on GitHub [2], but no official mitigation has been provided [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2
  • Wulkano/Kapreferences2 versions
    (expand)+ 1 more
    • (no CPE)
    • (no CPE)range: = 3.6.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.