CVE-2026-20625
Description
A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, visionOS 26.3. An app may be able to access sensitive user data.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A directory path parsing flaw in macOS and visionOS could let an app access sensitive user data; patched Feb 2026.
What the vulnerability is
CVE-2026-20625 is a parsing issue in the handling of directory paths across multiple Apple operating systems. The root cause is insufficient path validation, which could allow an application to bypass directory restrictions and access sensitive user data. The vulnerability was fixed with improved path validation [1].
Exploitation prerequisites
Exploitation requires that a malicious or compromised application be installed on the device. The attacker must have the capability to run code at the app level, but no additional privileges are specified. The attack surface is local, meaning an app already on the system can exploit the flaw to access data it should not be able to reach.
Impact
An attacker exploiting this vulnerability could read sensitive user data that would normally be protected by directory permissions [1][2]. The impact is limited to confidentiality, with no indication of data modification or system compromise. The severity is rated Medium (CVSS 5.5).
Mitigation
Apple has released patches for affected versions: macOS Sequoia 15.7.4, macOS Sonoma 14.8.4, macOS Tahoe 26.3, and visionOS 26.3 [1][2][3][4]. Users should update their devices to the latest available version. No workarounds are documented; updating is the recommended action.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
4- Range: <15.7.4
- Range: <14.8.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- support.apple.com/en-us/126348nvdRelease NotesVendor Advisory
- support.apple.com/en-us/126349nvdRelease NotesVendor Advisory
- support.apple.com/en-us/126350nvdRelease NotesVendor Advisory
- support.apple.com/en-us/126353nvdRelease NotesVendor Advisory
News mentions
0No linked articles in our index yet.