We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54595

Pearcleaner's unauthenticated access to privileged XPC helper allows root command execution



Description

Pearcleaner is a free, source-available and fair-code licensed mac app cleaner. The PearcleanerHelper is a privileged helper tool bundled with the Pearcleaner application. It is registered and activated only after the user approves a system prompt to allow privileged operations. Upon approval, the helper is configured as a LaunchDaemon and runs with root privileges. In versions 4.4.0 through 4.5.1, the helper registers an XPC service (com.alienator88.Pearcleaner.PearcleanerHelper) and accepts unauthenticated connections from any local process. It exposes a method that executes arbitrary shell commands. This allows any local unprivileged user to escalate privileges to root once the helper is approved and active. This issue is fixed in version 4.5.2.

Reserved 2025-07-25 | Published 2025-08-01 | Updated 2025-08-01 | Assigner GitHub_M


HIGH: 7.3CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Problem types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-269: Improper Privilege Management

Product status

>= 4.4.0, < 4.5.2
affected

References

github.com/...leaner/security/advisories/GHSA-gr2j-65fh-8pvc

github.com/alienator88/Pearcleaner/issues/278

github.com/...ommit/69afadfa95791cb998118ca35c227007b230b984

github.com/alienator88/Pearcleaner/releases/tag/4.5.2

cve.org (CVE-2025-54595)

nvd.nist.gov (CVE-2025-54595)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54595

Support options

Helpdesk Chat, Email, Knowledgebase