{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T17:57:20.541","vulnerabilities":[{"cve":{"id":"CVE-2025-4280","sourceIdentifier":"cvd@cert.pl","published":"2025-05-22T10:15:55.400","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"MacOS version of Poedit bundles a Python interpreter that inherits the Transparency, Consent, and Control (TCC) permissions\ngranted by the user to the main application bundle. An attacker with local user access can\ninvoke this interpreter with arbitrary commands or scripts, leveraging the\napplication's previously granted TCC permissions to access user's files in privacy-protected folders without triggering user prompts. Accessing other resources beyond previously granted TCC permissions will prompt the user for approval in the name of Poedit, potentially disguising attacker's malicious intent.\n\nThis issue has been fixed in 3.6.3 version of Poedit."},{"lang":"es","value":"La versión de Poedit para macOS incluye un intérprete de Python que hereda los permisos de Transparencia, Consentimiento y Control (TCC) otorgados por el usuario al paquete principal de la aplicación. Un atacante con acceso de usuario local puede invocar este intérprete con comandos o scripts arbitrarios, aprovechando los permisos de TCC previamente otorgados a la aplicación para acceder a los archivos del usuario en carpetas con protección de privacidad sin activar solicitudes de usuario. Acceder a otros recursos que no estén cubiertos por los permisos de TCC previamente otorgados solicitará la aprobación del usuario en nombre de Poedit, lo que podría ocultar las intenciones maliciosas del atacante. Este problema se ha corregido en la versión 3.6.3 de Poedit."}],"metrics":{"cvssMetricV40":[{"source":"cvd@cert.pl","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"cvd@cert.pl","type":"Secondary","description":[{"lang":"en","value":"CWE-276"}]}],"references":[{"url":"https://cert.pl/en/posts/2025/05/CVE-2025-4280","source":"cvd@cert.pl"},{"url":"https://cert.pl/posts/2025/05/CVE-2025-4280","source":"cvd@cert.pl"},{"url":"https://github.com/vslavik/poedit","source":"cvd@cert.pl"},{"url":"https://github.com/vslavik/poedit/security/advisories/GHSA-8fcw-v6gr-hp34","source":"cvd@cert.pl"},{"url":"https://poedit.net","source":"cvd@cert.pl"}]}}]}