CVE-2025-8672 – GIMP for MacOS Local Privilege Escalation

The following table lists the changes that have been made to the
CVE-2025-8672 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Aug. 11, 2025

    Action Type Old Value New Value
    Added Description MacOS version of GIMP bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions
    granted by the user to the main application bundle. An attacker with local user access can
    invoke this interpreter with arbitrary commands or scripts, leveraging the
    application’s previously granted TCC permissions to access user’s files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of GIMP, potentially disguising attacker’s malicious intent.

    This issue has been fixed in 3.1.4.2 version of GIMP.

    Added CVSS V4.0 AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-276
    Added Reference https://cert.pl/en/posts/2025/08/tcc-bypass/
    Added Reference https://gitlab.gnome.org/GNOME/gimp/-/issues/13848
    Added Reference https://gitlab.gnome.org/Infrastructure/gimp-macos-build
    Added Reference https://www.jamf.com/blog/zero-day-tcc-bypass-discovered-in-xcsset-malware/
Share the Post:

Related Posts