CVE-2026-20632

A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.4. An app may be able to access sensitive user data.
References
Link Resource
https://support.apple.com/en-us/126794 Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

25 Mar 2026, 20:28

Type Values Removed Values Added
First Time Apple macos
Apple
References () https://support.apple.com/en-us/126794 - () https://support.apple.com/en-us/126794 - Vendor Advisory
CPE cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

25 Mar 2026, 20:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
CWE CWE-284

25 Mar 2026, 01:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-25 01:17

Updated : 2026-03-25 20:28


NVD link : CVE-2026-20632

Mitre link : CVE-2026-20632

CVE.ORG link : CVE-2026-20632


JSON object : View

Products Affected

apple

  • macos
CWE
CWE-284

Improper Access Control