CVE-2025-9474

low

Description

A vulnerability was detected in Mihomo Party up to 1.8.1 on macOS. Affected is the function enableSysProxy of the file src/main/sys/sysproxy.ts of the component Socket Handler. The manipulation results in creation of temporary file with insecure permissions. The attack requires a local approach. This attack is characterized by high complexity. The exploitability is told to be difficult. The exploit is now public and may be used.

References

https://vuldb.com/?submit.634656

https://vuldb.com/?id.321343

https://vuldb.com/?ctiid.321343

https://github.com/SwayZGl1tZyyy/n-days/blob/main/mihomo-party/README.md#proof-of-concept-1

https://github.com/SwayZGl1tZyyy/n-days/blob/main/mihomo-party/README.md

Details

Source: Mitre, NVD

Published: 2025-08-26

Updated: 2025-08-26

Risk Information

CVSS v2

Base Score: 3.5

Vector: CVSS2#AV:L/AC:H/Au:S/C:P/I:P/A:P

Severity: Low

CVSS v3

Base Score: 4.5

Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

CVSS v4

Base Score: 1.1

Vector: CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Low