CVE ID | CVE-2025-8672 |
Publication date | 11 August 2025 |
Vendor | GIMP |
Product | GIMP |
Vulnerable versions | All before 3.1.4.2 (macOS only) |
Vulnerability type (CWE) | Incorrect Default Permissions (CWE-276) |
Report source | Report to CERT Polska |
CVE ID | CVE-2025-53811 |
Publication date | 26 August 2025 |
Vendor | Mosh-Pro |
Product | Mosh-Pro |
Vulnerable versions | All through 1.3.2 (macOS only) |
Vulnerability type (CWE) | Incorrect Default Permissions (CWE-276) |
Report source | Report to CERT Polska |
CVE ID | CVE-2025-9190 |
Publication date | 26 August 2025 |
Vendor | Cursor |
Product | Cursor |
Vulnerable versions | All through 15.4.1 (macOS only) |
Vulnerability type (CWE) | Incorrect Default Permissions (CWE-276) |
Report source | Report to CERT Polska |
CVE ID | CVE-2025-8597 |
Publication date | 26 August 2025 |
Vendor | MacVim |
Product | MacVim |
Vulnerable versions | All before r181.2 (macOS only) |
Vulnerability type (CWE) | Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) |
Report source | Report to CERT Polska |
CVE ID | CVE-2025-8700 |
Publication date | 26 August 2025 |
Vendor | Invoice Ninja |
Product | Invoice Ninja |
Vulnerable versions | All before 5.0.175 (macOS only) |
Vulnerability type (CWE) | Exposure of Sensitive System Information to an Unauthorized Control Sphere (CWE-497) |
Report source | Report to CERT Polska |
CVE ID | CVE-2025-53813 |
Publication date | 26 August 2025 |
Vendor | Nozbe |
Product | Nozbe |
Vulnerable versions | All before 2025.11 (macOS only) |
Vulnerability type (CWE) | Incorrect Default Permissions (CWE-276) |
Report source | Report to CERT Polska |
Description
CERT Polska has received a report about vulnerabilities in GIMP, Mosh-Pro, Cursor, MacVim, Nozbe and Invoice Ninja applications for MacOS system and participated in coordination of its disclosure.
The vulnerability CVE-2025-8672: MacOS version of GIMP bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle. An attacker with local user access can invoke this interpreter with arbitrary commands or scripts, leveraging the application's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts.
This issue has been fixed in 3.1.4.2 version of GIMP.
The vulnerability CVE-2025-53811: The configuration of Mosh-Pro on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Mosh-Pro TCC (Transparency, Consent, and Control) permissions.
This issue was detected in 1.3.2 version of Mosh-Pro. Since authors did not respond to messages from CERT.PL CNA, patching status is unknown.
The vulnerability CVE-2025-9190: The configuration of Cursor on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Cursor TCC (Transparency, Consent, and Control) permissions.
This issue was detected in 15.4.1 version of Cursor. Project maintainers decided not to fix this issue, because a scenario including a local attacker falls outside their defined threat model.
The vulnerability CVE-2025-53813: The configuration of Nozbe on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions.
This issue was fixed in version 2025.11 of Nozbe.
The vulnerability CVE-2025-8597: MacVim's configuration on macOS, specifically the presence of entitlement "com.apple.security.get-task-allow", allows local attackers with unprivileged access (e.g. via a malicious application) to attach a debugger, read or modify the process memory, inject code in the application's context despite being signed with Hardened Runtime and bypass Transparency, Consent, and Control (TCC).
This issue was fixed in build r181.2
The vulnerability CVE-2025-8700: Invoice Ninja's configuration on macOS, specifically the presence of entitlement "com.apple.security.get-task-allow", allows local attackers with unprivileged access (e.g. via a malicious application) to attach a debugger, read or modify the process memory, inject code in the application's context despite being signed with Hardened Runtime and bypass Transparency, Consent, and Control (TCC).
This issue was fixed in version 5.0.175
According to Apple documentation, when a non-root user runs an app with the debugging tool entitlement, the system presents an authorization dialog asking for a system administrator's credentials. Since there is no prompt when the target process has "get-task-allow" entitlement, the presence of this entitlement was decided to be treated as a vulnerability because it removes one step needed to perform an attack.
In all cases, acquired resource access is limited to previously granted permissions by the user. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of the vulnerable application, potentially disguising attacker's malicious intent.
Credits
We thank Karol Mazurek from AFINE Team for the responsible vulnerability report.
More about the coordinated vulnerability disclosure process at CERT Polska can be found at https://cert.pl/en/cvd/.