CVE-2025-34089
Remote for Mac Unauthenticated Remote Code Execution via AppleScript Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
An unauthenticated remote code execution vulnerability exists in Remote for Mac, a macOS remote control utility developed by Aexol Studio, in versions up to and including 2025.7. When the application is configured with authentication disabled (i.e., the "Allow unknown devices" option is enabled), the /api/executeScript endpoint is exposed without access control. This allows unauthenticated remote attackers to inject arbitrary AppleScript payloads via the X-Script HTTP header, resulting in code execution using do shell script. Successful exploitation grants attackers the ability to run arbitrary commands on the macOS host with the privileges of the Remote for Mac background process.
Existe una vulnerabilidad de ejecución remota de código no autenticado en Remote for Mac, una utilidad de control remoto para macOS desarrollada por Aexol Studio, en versiones hasta la 2025.7 incluida. Cuando la aplicación se configura con la autenticación deshabilitada (es decir, con la opción "Permitir dispositivos desconocidos" habilitada), el endpoint /api/executeScript queda expuesto sin control de acceso. Esto permite a atacantes remotos no autenticados inyectar payloads arbitrarias de AppleScript a través de la cabecera HTTP X-Script, lo que resulta en la ejecución de código mediante un script de shell. Una explotación exitosa permite a los atacantes ejecutar comandos arbitrarios en el host macOS con los privilegios del proceso en segundo plano de Remote for Mac.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2025-04-15 CVE Reserved
- 2025-07-03 CVE Published
- 2025-07-03 CVE Updated
- 2025-07-03 First Exploit
- 2025-07-09 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-306: Missing Authentication for Critical Function
CAPEC
- CAPEC-122: Privilege Abuse
- CAPEC-137: Parameter Injection
- CAPEC-248: Command Injection
References (5)
URL | Tag | Source |
---|---|---|
https://apps.apple.com/us/app/remote-for-mac/id1086962925 | Product | |
https://vulncheck.com/advisories/remote-for-mac-rce | Third Party Advisory | |
https://www.rapid7.com/db/modules/exploit/osx/http/remote_for_mac_rce | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/195347 | 2025-07-03 | |
https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/osx/http/remote_for_mac_rce.rb | 2025-07-03 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Aexol Studio Search vendor "Aexol Studio" | Remote For Mac Search vendor "Aexol Studio" for product "Remote For Mac" | <= 2025.7 Search vendor "Aexol Studio" for product "Remote For Mac" and version " <= 2025.7" | en |
Affected
|