Vulnerabilites related to alienator88 - Pearcleaner
CVE-2025-54595 (GCVE-0-2025-54595)
Vulnerability from cvelistv5
Published
2025-08-01 18:06
Modified
2025-08-01 18:21
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
  • CWE-269 - Improper Privilege Management
Summary
Pearcleaner is a free, source-available and fair-code licensed mac app cleaner. The PearcleanerHelper is a privileged helper tool bundled with the Pearcleaner application. It is registered and activated only after the user approves a system prompt to allow privileged operations. Upon approval, the helper is configured as a LaunchDaemon and runs with root privileges. In versions 4.4.0 through 4.5.1, the helper registers an XPC service (com.alienator88.Pearcleaner.PearcleanerHelper) and accepts unauthenticated connections from any local process. It exposes a method that executes arbitrary shell commands. This allows any local unprivileged user to escalate privileges to root once the helper is approved and active. This issue is fixed in version 4.5.2.
Impacted products
Vendor Product Version
alienator88 Pearcleaner Version: >= 4.4.0, < 4.5.2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-54595",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-01T18:21:37.941397Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-01T18:21:50.407Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Pearcleaner",
          "vendor": "alienator88",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 4.4.0, \u003c 4.5.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Pearcleaner is a free, source-available and fair-code licensed mac app cleaner. The PearcleanerHelper is a privileged helper tool bundled with the Pearcleaner application. It is registered and activated only after the user approves a system prompt to allow privileged operations. Upon approval, the helper is configured as a LaunchDaemon and runs with root privileges. In versions 4.4.0 through 4.5.1, the helper registers an XPC service (com.alienator88.Pearcleaner.PearcleanerHelper) and accepts unauthenticated connections from any local process. It exposes a method that executes arbitrary shell commands. This allows any local unprivileged user to escalate privileges to root once the helper is approved and active. This issue is fixed in version 4.5.2."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269: Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-01T18:06:23.948Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/alienator88/Pearcleaner/security/advisories/GHSA-gr2j-65fh-8pvc",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/alienator88/Pearcleaner/security/advisories/GHSA-gr2j-65fh-8pvc"
        },
        {
          "name": "https://github.com/alienator88/Pearcleaner/issues/278",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/alienator88/Pearcleaner/issues/278"
        },
        {
          "name": "https://github.com/alienator88/Pearcleaner/commit/69afadfa95791cb998118ca35c227007b230b984",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/alienator88/Pearcleaner/commit/69afadfa95791cb998118ca35c227007b230b984"
        },
        {
          "name": "https://github.com/alienator88/Pearcleaner/releases/tag/4.5.2",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/alienator88/Pearcleaner/releases/tag/4.5.2"
        }
      ],
      "source": {
        "advisory": "GHSA-gr2j-65fh-8pvc",
        "discovery": "UNKNOWN"
      },
      "title": "Pearcleaner\u0027s unauthenticated access to privileged XPC helper allows root command execution"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2025-54595",
    "datePublished": "2025-08-01T18:06:23.948Z",
    "dateReserved": "2025-07-25T16:19:16.095Z",
    "dateUpdated": "2025-08-01T18:21:50.407Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}