The Sparkle framework includes an XPC service Downloader.xpc, by default this service is private to the application its bundled with. A local unprivileged attacker can register this XPC service globally which will inherit TCC permissions of the application. Lack of validation of connecting client allows the attacker to copy TCC-protected files to an arbitrary location. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 2.7.2
History

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Sparkle-project
Sparkle-project sparkle
Vendors & Products Sparkle-project
Sparkle-project sparkle

Tue, 16 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
Description The Sparkle framework includes an XPC service Downloader.xpc, by default this service is private to the application its bundled with. A local unprivileged attacker can register this XPC service globally which will inherit TCC permissions of the application. Lack of validation of connecting client allows the attacker to copy TCC-protected files to an arbitrary location. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 2.7.2
Title TCC Bypass via Downloader XPC Service in Sparkle
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-09-16T10:03:22.903Z

Updated: 2025-09-16T19:26:58.684Z

Reserved: 2025-09-05T09:41:09.869Z

Link: CVE-2025-10015

cve-icon Vulnrichment

Updated: 2025-09-16T19:26:55.615Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-16T10:15:37.520

Modified: 2025-09-16T12:49:16.060

Link: CVE-2025-10015

cve-icon Redhat

No data.