CVE-2025-4280 – Poedit for MacOS Privilege Escalation Vulnerability

The following table lists the changes that have been made to the
CVE-2025-4280 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    May. 22, 2025

    Action Type Old Value New Value
    Added Description MacOS version of Poedit bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions
    granted by the user to the main application bundle. An attacker with local user access can
    invoke this interpreter with arbitrary commands or scripts, leveraging the
    application’s previously granted TCC permissions to access user’s files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Poedit, potentially disguising attacker’s malicious intent.

    This issue has been fixed in 3.6.3 version of Poedit.

    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-276
    Added Reference https://cert.pl/en/posts/2025/05/CVE-2025-4280
    Added Reference https://cert.pl/posts/2025/05/CVE-2025-4280
    Added Reference https://github.com/vslavik/poedit
    Added Reference https://github.com/vslavik/poedit/security/advisories/GHSA-8fcw-v6gr-hp34
    Added Reference https://poedit.net
Share the Post:

Related Posts