Home

Description

The Sparkle framework includes an XPC service Downloader.xpc, by default this service is private to the application its bundled with. A local unprivileged attacker can register this XPC service globally which will inherit TCC permissions of the application. Lack of validation of connecting client allows the attacker to copy TCC-protected files to an arbitrary location. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 2.7.2

PUBLISHED Reserved 2025-09-05 | Published 2025-09-16 | Updated 2025-09-16 | Assigner CERT-PL




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

Any version before 2.7.2
affected

Credits

Karol Mazurek - Afine Team finder

References

cert.pl/en/posts/2025/09/CVE-2025-10015 third-party-advisory

github.com/sparkle-project/Sparkle product

github.com/sparkle-project/Sparkle/discussions/2764 vendor-advisory

cve.org (CVE-2025-10015)

nvd.nist.gov (CVE-2025-10015)

Download JSON