CVE-2025-0509: Sparkle Signing Checks Bypass
7.4
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.01395%
CWE
Published
2/4/2025
Updated
2/4/2025
KEV Status
No
Technology
Swift
Technical Details
CVSS Vector
CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/sparkle-project/Sparkle | swift | <= 2.6.3 | 2.6.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper directory isolation during archive extraction. The GitHub PR #2550 specifically addresses this by separating input/output directories, and the CWE-552 (External File Access) aligns with directory access issues. The commit message explicitly states this fixes an attack vector where input archives could be overwritten. The SUUnarchiver class is central to Sparkle's update processing, making it the logical location for this vulnerability. High confidence comes from direct correlation between the fix in 2.6.4, the CWE mapping, and the advisory description of signature bypass through file replacement.