The Sparkle framework includes a helper tool Autoupdate. Due to lack of authentication of connecting clients a local unprivileged attacker can request installation of crafted malicious PKG file by racing to connect to the daemon when other app spawns it as root. This results in local privilege escalation to root privileges. It is worth noting that it is possible to spawn Autopudate manually via Installer XPC service. However this requires the victim to enter credentials upon system authorization dialog creation that can be modified by the attacker. This issue was fixed in version 2.7.2
History

Wed, 17 Sep 2025 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Sparkle-project
Sparkle-project sparkle
Vendors & Products Sparkle-project
Sparkle-project sparkle

Tue, 16 Sep 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Sep 2025 10:15:00 +0000

Type Values Removed Values Added
Description The Sparkle framework includes a helper tool Autoupdate. Due to lack of authentication of connecting clients a local unprivileged attacker can request installation of crafted malicious PKG file by racing to connect to the daemon when other app spawns it as root. This results in local privilege escalation to root privileges. It is worth noting that it is possible to spawn Autopudate manually via Installer XPC service. However this requires the victim to enter credentials upon system authorization dialog creation that can be modified by the attacker. This issue was fixed in version 2.7.2
Title Local Privilege Escalation in Sparkle Autoupdate Daemon
Weaknesses CWE-863
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published: 2025-09-16T10:03:28.701Z

Updated: 2025-09-16T19:27:29.447Z

Reserved: 2025-09-05T09:46:13.751Z

Link: CVE-2025-10016

cve-icon Vulnrichment

Updated: 2025-09-16T19:27:26.225Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-16T10:15:38.177

Modified: 2025-09-16T12:49:16.060

Link: CVE-2025-10016

cve-icon Redhat

No data.