CVE-2025-8672
📋 TL;DR
This vulnerability allows local attackers on macOS to abuse GIMP's bundled Python interpreter to access privacy-protected files without user consent. The Python interpreter inherits the Transparency, Consent, and Control (TCC) permissions granted to GIMP, enabling unauthorized access to user data. Only macOS users running vulnerable versions of GIMP are affected.
💻 Affected Systems
- GIMP (GNU Image Manipulation Program)
📦 What is this software?
Gimp by Gimp
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access could read sensitive files from privacy-protected folders (Documents, Desktop, Downloads, etc.), potentially stealing personal data, credentials, or confidential information without triggering security prompts.
Likely Case
Malicious local users or malware could leverage this to access user documents, photos, and other protected files that GIMP had previously been granted permission to access.
If Mitigated
With proper access controls and updated software, the risk is limited to authorized users only, preventing unauthorized file access.
🎯 Exploit Status
Exploitation requires local user access and knowledge of how to invoke the bundled Python interpreter with malicious commands. References show similar TCC bypass techniques have been used in malware.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.1.4.2
Vendor Advisory: https://gitlab.gnome.org/GNOME/gimp/-/issues/13848
Restart Required: No
Instructions:
1. Open GIMP. 2. Go to GIMP menu > About GIMP to check current version. 3. If version is below 3.1.4.2, download and install the latest version from https://www.gimp.org/downloads/. 4. Verify installation by checking version again.
🔧 Temporary Workarounds
Revoke GIMP TCC Permissions
macOSRemove GIMP's access to privacy-protected folders in macOS System Settings to prevent exploitation.
1. Open System Settings > Privacy & Security > Files and Folders
2. Find GIMP in the list
3. Toggle off all folder permissions
Uninstall Vulnerable GIMP Version
macOSRemove the vulnerable application until patched version can be installed.
1. Move GIMP.app from Applications folder to Trash
2. Empty Trash
🧯 If You Can't Patch
- Restrict local user access to systems with vulnerable GIMP installations
- Implement application allowlisting to prevent unauthorized execution of GIMP's Python interpreter
🔍 How to Verify
Check if Vulnerable:
Check GIMP version: Open GIMP, go to GIMP menu > About GIMP. If version is below 3.1.4.2, the system is vulnerable.
Check Version:
/Applications/GIMP.app/Contents/MacOS/gimp --version
Verify Fix Applied:
After updating, verify GIMP version is 3.1.4.2 or higher using the same About GIMP menu.
📡 Detection & Monitoring
Log Indicators:
- Unusual Python process execution from GIMP bundle path
- File access to protected folders by GIMP Python processes outside normal usage patterns
Network Indicators:
- None - this is a local file access vulnerability
SIEM Query:
Process execution where parent_process contains 'GIMP' and process contains 'python' AND file_access events to protected folders (Documents, Desktop, Downloads)