Spotlight on MacOS Flaw: How Hackers Could Have Bypassed Apple’s TCC Protections!
Microsoft shines a light on Sploitlight, a macOS vulnerability that bypassed Apple’s TCC protections. This flaw turned Spotlight plugins into unwitting spies, leaking sensitive data. Thankfully, Apple’s macOS Sequoia 15.4 update dimmed Sploitlight’s mischief.

Hot Take:
Looks like Apple’s TCC protections are more transparent than consented! Who knew macOS had a secret spotlight for hackers to shine on your private data? Maybe Apple should consider renaming their operating system to macOS “Peek-a-boo”—because that’s exactly what hackers have been doing with your files! Time for Apple to get better at playing hide and seek!
Key Points:
- Microsoft identified a vulnerability in macOS allowing attackers to bypass TCC protections.
- The flaw, CVE-2025-31199, was fixed in March 2025 with updates to macOS, iOS, iPadOS, and visionOS.
- Spotlight plugins could be exploited to leak sensitive user information and file contents.
- Attackers could access personal data like geolocation, photos, and even remote device info via iCloud.
- Microsoft developed a proof-of-concept exploit, Sploitlight, to demonstrate the vulnerability.
Already a member? Log in here