Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 14 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* |
Wed, 13 May 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Directory Path Parsing Issue Leading to Root Privilege Escalation |
Wed, 13 May 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Improper Directory Path Validation in macOS | |
| Weaknesses | CWE-284 CWE-613 |
Wed, 13 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 | |
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple macos |
|
| Vendors & Products |
Apple
Apple macos |
Mon, 11 May 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Privilege Escalation via Improper Directory Path Validation in macOS | |
| Weaknesses | CWE-284 CWE-613 |
Mon, 11 May 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5. An app may be able to gain root privileges. | |
| References |
|
Status: PUBLISHED
Assigner: apple
Published:
Updated: 2026-05-13T14:39:49.022Z
Reserved: 2026-03-03T16:36:03.985Z
Link: CVE-2026-28915
Updated: 2026-05-13T13:51:06.627Z
Status : Analyzed
Published: 2026-05-11T21:18:54.000
Modified: 2026-05-14T14:02:11.390
Link: CVE-2026-28915
No data.
OpenCVE Enrichment
Updated: 2026-05-13T21:00:05Z