TCC Bypass via Downloader XPC Service in Sparkle
CVE-2025-10015
4.8MEDIUM
What is CVE-2025-10015?
The Sparkle framework includes an XPC service Downloader.xpc, by default this service is private to the application its bundled with. A local unprivileged attacker can register this XPC service globally which will inherit TCC permissions of the application. Lack of validation of connecting client allows the attacker to copy TCC-protected files to an arbitrary location. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.
This issue was fixed in version 2.7.2
Affected Version(s)
Sparkle MacOS 0 < 2.7.2