Vulnerabilites related to alienator88 - Pearcleaner
CVE-2025-54595 (GCVE-0-2025-54595)
Vulnerability from cvelistv5
Published
2025-08-01 18:06
Modified
2025-08-01 18:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Pearcleaner is a free, source-available and fair-code licensed mac app cleaner. The PearcleanerHelper is a privileged helper tool bundled with the Pearcleaner application. It is registered and activated only after the user approves a system prompt to allow privileged operations. Upon approval, the helper is configured as a LaunchDaemon and runs with root privileges. In versions 4.4.0 through 4.5.1, the helper registers an XPC service (com.alienator88.Pearcleaner.PearcleanerHelper) and accepts unauthenticated connections from any local process. It exposes a method that executes arbitrary shell commands. This allows any local unprivileged user to escalate privileges to root once the helper is approved and active. This issue is fixed in version 4.5.2.
References
▼ | URL | Tags |
---|---|---|
https://github.com/alienator88/Pearcleaner/security/advisories/GHSA-gr2j-65fh-8pvc | x_refsource_CONFIRM | |
https://github.com/alienator88/Pearcleaner/issues/278 | x_refsource_MISC | |
https://github.com/alienator88/Pearcleaner/commit/69afadfa95791cb998118ca35c227007b230b984 | x_refsource_MISC | |
https://github.com/alienator88/Pearcleaner/releases/tag/4.5.2 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
alienator88 | Pearcleaner |
Version: >= 4.4.0, < 4.5.2 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-54595", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-08-01T18:21:37.941397Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-01T18:21:50.407Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Pearcleaner", "vendor": "alienator88", "versions": [ { "status": "affected", "version": "\u003e= 4.4.0, \u003c 4.5.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Pearcleaner is a free, source-available and fair-code licensed mac app cleaner. The PearcleanerHelper is a privileged helper tool bundled with the Pearcleaner application. It is registered and activated only after the user approves a system prompt to allow privileged operations. Upon approval, the helper is configured as a LaunchDaemon and runs with root privileges. In versions 4.4.0 through 4.5.1, the helper registers an XPC service (com.alienator88.Pearcleaner.PearcleanerHelper) and accepts unauthenticated connections from any local process. It exposes a method that executes arbitrary shell commands. This allows any local unprivileged user to escalate privileges to root once the helper is approved and active. This issue is fixed in version 4.5.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269: Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-01T18:06:23.948Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/alienator88/Pearcleaner/security/advisories/GHSA-gr2j-65fh-8pvc", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/alienator88/Pearcleaner/security/advisories/GHSA-gr2j-65fh-8pvc" }, { "name": "https://github.com/alienator88/Pearcleaner/issues/278", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/alienator88/Pearcleaner/issues/278" }, { "name": "https://github.com/alienator88/Pearcleaner/commit/69afadfa95791cb998118ca35c227007b230b984", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/alienator88/Pearcleaner/commit/69afadfa95791cb998118ca35c227007b230b984" }, { "name": "https://github.com/alienator88/Pearcleaner/releases/tag/4.5.2", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/alienator88/Pearcleaner/releases/tag/4.5.2" } ], "source": { "advisory": "GHSA-gr2j-65fh-8pvc", "discovery": "UNKNOWN" }, "title": "Pearcleaner\u0027s unauthenticated access to privileged XPC helper allows root command execution" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-54595", "datePublished": "2025-08-01T18:06:23.948Z", "dateReserved": "2025-07-25T16:19:16.095Z", "dateUpdated": "2025-08-01T18:21:50.407Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }