CVE-2025-8597
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-26

Last updated on: 2025-08-26

Assigner: CERT.PL

Description
MacVim's configuration on macOS, specifically the presence of entitlement "com.apple.security.get-task-allow", allows local attackers with unprivileged access (e.g. via a malicious application) to attach a debugger, read or modify the process memory, inject code in the application's context despite being signed with Hardened Runtime and bypass Transparency, Consent, and Control (TCC). Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted permissions requires user interaction with a system prompt asking for permission. According to Apple documentation, when a non-root user runs an app with the debugging tool entitlement, the system presents an authorization dialog asking for a system administrator's credentials. Since there is no prompt when the target process has "get-task-allow" entitlement, the presence of this entitlement was decided to be treated as a vulnerability because it removes one step needed to perform an attack. This issue was fixed in build r181.2
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-26
Last Modified
2025-08-26
Generated
2026-05-07
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
invoice_ninja invoice_ninja *
macvim macvim *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-497 The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves MacVim on macOS having the 'com.apple.security.get-task-allow' entitlement enabled in its configuration. This entitlement allows local attackers with limited privileges, such as through a malicious application, to attach a debugger to MacVim, read or modify its process memory, and inject code into its context. This happens despite MacVim being signed with the Hardened Runtime and bypasses macOS's Transparency, Consent, and Control (TCC) protections. Normally, attaching a debugger requires user or administrator authorization, but this entitlement removes that step, making it easier for attackers to exploit the application. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability allows a local attacker to debug MacVim without proper authorization, potentially reading or modifying its memory and injecting malicious code. This could lead to unauthorized code execution within MacVim's process, compromising the security and integrity of the application. However, access to other system resources remains limited to those already granted by the user, and additional permissions require user interaction. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the MacVim application binary is signed with the "get-task-allow" entitlement. You can inspect the entitlements of the MacVim binary using the command: `codesign -d --entitlements :- /path/to/MacVim.app` and look for the presence of the "com.apple.security.get-task-allow" entitlement. If this entitlement is present, the vulnerability exists. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update MacVim to a version that has removed the "get-task-allow" entitlement, specifically build r181.2 or later. If building locally, use the new make target that signs MacVim builds with an ad-hoc signature embedding the correct entitlements without "get-task-allow". Avoid using versions of MacVim that include the unnecessary debugging entitlement to prevent local attackers from attaching debuggers or injecting code. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart