Sparkle <=2.6.4 Bypass EDSA Signing for Update Replacement
CVE-2025-0509 Published on February 4, 2025
Signing Checks Bypass
A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkles (Ed)DSA signing checks.
Vulnerability Analysis
Weakness Type
Files or Directories Accessible to External Parties
The product makes files or directories accessible to unauthorized actors, even though they should not be. Web servers, FTP servers, and similar servers may store a set of files underneath a "root" directory that is accessible to the server's users. Applications may store sensitive files underneath this root without also using access control to limit which users may request those files, if any. Alternately, an application might package multiple files or directories into an archive file (e.g., ZIP or tar), but the application might not exclude sensitive files that are underneath those directories.
Products Associated with CVE-2025-0509
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-0509 are published in these products:
Affected Versions
sparkle-project Sparkle:- Before 2.6.4 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.