The configuration of Nozbe on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions. 
Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission.
This issue was fixed in version 2025.11 of Nozbe.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://cert.pl/en/posts/2025/08/tcc-bypass/ |     | 
| https://nozbe.com/ |     | 
History
                    Wed, 27 Aug 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Apple Apple macos Nozbe Nozbe nozbe | |
| Vendors & Products | Apple Apple macos Nozbe Nozbe nozbe | 
Tue, 26 Aug 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 26 Aug 2025 12:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The configuration of Nozbe on macOS, specifically the "RunAsNode" fuse enabled, allows a local attacker with unprivileged access to execute arbitrary code that inherits Nozbe TCC (Transparency, Consent, and Control) permissions. Acquired resource access is limited to previously granted permissions by the user. Access to other resources beyond granted-permissions requires user interaction with a system prompt asking for permission. This issue was fixed in version 2025.11 of Nozbe. | |
| Title | TCC Bypass via misconfigured Node fuses in Nozbe | |
| Weaknesses | CWE-276 | |
| References |  | |
| Metrics | cvssV4_0 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: CERT-PL
Published: 2025-08-26T12:22:57.545Z
Updated: 2025-08-26T13:59:53.451Z
Reserved: 2025-07-09T13:42:44.066Z
Link: CVE-2025-53813
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-08-26T13:59:27.520Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2025-08-26T13:15:32.660
Modified: 2025-08-26T13:41:58.950
Link: CVE-2025-53813
 Redhat
                        Redhat
                    No data.