Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31182: An app may be able to delete files for which it does not have permission in Apple iOS and iPadOS

0
Critical
VulnerabilityCVE-2025-31182cvecve-2025-31182
Published: Mon Mar 31 2025 (03/31/2025, 22:22:56 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: iOS and iPadOS

Description

This issue was addressed with improved handling of symlinks. This issue is fixed in iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, watchOS 11.4. An app may be able to delete files for which it does not have permission.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:14:43 UTC

Technical Analysis

CVE-2025-31182 is a critical security vulnerability affecting Apple’s iOS, iPadOS, and several other Apple operating systems. The root cause is improper handling of symbolic links (symlinks), which allows a malicious or compromised app to delete files it does not have permission to access. This vulnerability violates the expected access control mechanisms, enabling unauthorized file deletion that can compromise system integrity and availability. The flaw is present in versions prior to iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Exploitation requires no privileges or user interaction, making it highly accessible to attackers. The vulnerability is classified under CWE-862 (Missing Authorization), highlighting a failure to properly enforce access control policies. The CVSS v3.1 base score is 9.8, reflecting its critical severity with network attack vector, low complexity, no privileges required, and no user interaction needed. While no known exploits have been reported in the wild, the potential for destructive attacks such as unauthorized deletion of critical system or user files is significant. Apple has addressed the issue by improving symlink handling in the affected OS versions. This vulnerability affects a broad range of Apple products, including mobile devices, desktops, TVs, and wearable devices, underscoring the importance of timely patching across all platforms.

Potential Impact

The impact of CVE-2025-31182 is severe for organizations and individuals relying on Apple devices. Unauthorized deletion of files can lead to data loss, corruption of critical system files, and potential denial of service due to system instability or failure. Confidentiality is impacted because attackers can manipulate file system contents, potentially deleting sensitive data. Integrity is compromised as unauthorized file deletions alter the expected state of the system. Availability is affected since critical files or applications may be removed, causing crashes or rendering devices unusable. The ease of exploitation—requiring no privileges or user interaction—means attackers can remotely or locally execute attacks with minimal barriers. This vulnerability could be leveraged in targeted attacks against high-value Apple device users or in widespread malware campaigns. Organizations with large Apple device deployments, including enterprises, government agencies, and service providers, face increased risk of operational disruption and data breaches if unpatched. The broad range of affected Apple operating systems increases the scope of potential impact across multiple device types and use cases.

Mitigation Recommendations

To mitigate CVE-2025-31182, organizations and users should immediately apply the security updates released by Apple: iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, macOS Sonoma 14.7.5, macOS Ventura 13.7.5, tvOS 18.4, visionOS 2.4, and watchOS 11.4. Beyond patching, organizations should implement strict app vetting and restrict installation of apps from untrusted sources to reduce exposure to malicious apps exploiting this flaw. Employ Mobile Device Management (MDM) solutions to enforce update policies and monitor device compliance. Regularly audit file system permissions and monitor for unusual file deletion activities or anomalies in system logs that may indicate exploitation attempts. Consider deploying endpoint detection and response (EDR) tools capable of detecting suspicious file system operations. For high-security environments, implement application sandboxing and least privilege principles to limit app capabilities further. Educate users about the importance of timely updates and cautious app installation practices. Maintain offline backups of critical data to recover from potential destructive attacks leveraging this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.310Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6909154cc28fd46ded7bb787

Added to database: 11/3/2025, 8:49:16 PM

Last enriched: 4/3/2026, 1:14:43 AM

Last updated: 5/10/2026, 4:07:31 AM

Views: 168

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses