Unrated severityNVD Advisory· Published Mar 18, 2026· Updated Mar 18, 2026
World-writable uninstall script executed as root in Arturia Software Center
CVE-2026-24063
Description
When a plugin is installed using the Arturia Software Center (MacOS), it also installs an uninstall.sh bash script in a root owned path. This script is written to disk with the file permissions 777, meaning it is writable by any user. When uninstalling a plugin via the Arturia Software Center the Privileged Helper gets instructed to execute this script. When the bash script is manipulated by an attacker this scenario will lead to privilege escalation.
Affected products
1- Range: 2.12.0.3157
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- r.sec-consult.com/arturiamitrethird-party-advisory
News mentions
0No linked articles in our index yet.