CVE-2025-54595 – Pearcleaner Privilege Escalation Vulnerability

The following table lists the changes that have been made to the
CVE-2025-54595 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 01, 2025

    Action Type Old Value New Value
    Added Description Pearcleaner is a free, source-available and fair-code licensed mac app cleaner. The PearcleanerHelper is a privileged helper tool bundled with the Pearcleaner application. It is registered and activated only after the user approves a system prompt to allow privileged operations. Upon approval, the helper is configured as a LaunchDaemon and runs with root privileges. In versions 4.4.0 through 4.5.1, the helper registers an XPC service (com.alienator88.Pearcleaner.PearcleanerHelper) and accepts unauthenticated connections from any local process. It exposes a method that executes arbitrary shell commands. This allows any local unprivileged user to escalate privileges to root once the helper is approved and active. This issue is fixed in version 4.5.2.
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
    Added CWE CWE-78
    Added CWE CWE-269
    Added Reference https://github.com/alienator88/Pearcleaner/commit/69afadfa95791cb998118ca35c227007b230b984
    Added Reference https://github.com/alienator88/Pearcleaner/issues/278
    Added Reference https://github.com/alienator88/Pearcleaner/releases/tag/4.5.2
    Added Reference https://github.com/alienator88/Pearcleaner/security/advisories/GHSA-gr2j-65fh-8pvc
Share the Post:

Related Posts