CVE-2026-40191
ClearanceKit has a policy bypass via dual-path Endpoint Security events checking only source path
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
2th
ClearanceKit intercepts file-system access events on macOS and enforces per-process access policies. Prior to 5.0.4-beta-1f46165, ClearanceKit's Endpoint Security event handler only checked the source path of dual-path file operations against File Access Authorization (FAA) rules and App Jail policies. The destination path was ignored entirely. This allowed any local process to bypass file-access protection by using rename, link, copyfile, exchangedata, or clone operations to place or replace files inside protected directories. This vulnerability is fixed in 5.0.4-beta-1f46165.
| CWE | CWE-863 |
| Vendor | craigjbass |
| Product | clearancekit |
| Published | Apr 10, 2026 |
| Last Updated | Apr 15, 2026 |
Stay Ahead of the Next One
Get instant alerts for craigjbass clearancekit
Be the first to know when new unknown vulnerabilities affecting craigjbass clearancekit are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
craigjbass / clearancekit
< 5.0.4-beta-1f46165