// For flags

CVE-2025-34089

Remote for Mac Unauthenticated Remote Code Execution via AppleScript Injection

Severity Score

9.3
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

An unauthenticated remote code execution vulnerability exists in Remote for Mac, a macOS remote control utility developed by Aexol Studio, in versions up to and including 2025.7. When the application is configured with authentication disabled (i.e., the "Allow unknown devices" option is enabled), the /api/executeScript endpoint is exposed without access control. This allows unauthenticated remote attackers to inject arbitrary AppleScript payloads via the X-Script HTTP header, resulting in code execution using do shell script. Successful exploitation grants attackers the ability to run arbitrary commands on the macOS host with the privileges of the Remote for Mac background process.

Existe una vulnerabilidad de ejecución remota de código no autenticado en Remote for Mac, una utilidad de control remoto para macOS desarrollada por Aexol Studio, en versiones hasta la 2025.7 incluida. Cuando la aplicación se configura con la autenticación deshabilitada (es decir, con la opción "Permitir dispositivos desconocidos" habilitada), el endpoint /api/executeScript queda expuesto sin control de acceso. Esto permite a atacantes remotos no autenticados inyectar payloads arbitrarias de AppleScript a través de la cabecera HTTP X-Script, lo que resulta en la ejecución de código mediante un script de shell. Una explotación exitosa permite a los atacantes ejecutar comandos arbitrarios en el host macOS con los privilegios del proceso en segundo plano de Remote for Mac.

*Credits: Chokri Hammedi
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
High
None
Availability
High
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2025-04-15 CVE Reserved
  • 2025-07-03 CVE Published
  • 2025-07-03 CVE Updated
  • 2025-07-03 First Exploit
  • 2025-07-09 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
  • CWE-306: Missing Authentication for Critical Function
CAPEC
  • CAPEC-122: Privilege Abuse
  • CAPEC-137: Parameter Injection
  • CAPEC-248: Command Injection
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Aexol Studio
Search vendor "Aexol Studio"
Remote For Mac
Search vendor "Aexol Studio" for product "Remote For Mac"
<= 2025.7
Search vendor "Aexol Studio" for product "Remote For Mac" and version " <= 2025.7"
en
Affected