Impact
A use‑after‑free vulnerability in WebKitGTK is triggered when Safari processes maliciously crafted web content, causing the browser to crash. The flaw arises from improper memory management during page parsing, which can destabilize the rendering engine and result in a denial‑of‑service for the user. The issue affects all components that embed WebKitGTK, including Safari on Apple devices.
Affected Systems
The vulnerability impacts Apple Safari and related WebKitGTK implementations on macOS Sequoia 15.4, iOS 18.4, iPadOS 18.4 (and iPadOS 17.7.6), tvOS 18.4, visionOS 2.4, watchOS 11.4, and any system running Safari versions prior to 18.4. Additionally, Red Hat Enterprise Linux 8 and 9 packages containing WebKitGTK are affected, as indicated by the CPE entries for RHEL 8, RHEL 9, and various extended update support branches.
Risk and Exploitability
The CVSS score of 4.3 reflects a low‑to‑moderate severity, while the EPSS score of 1 % indicates a rare exploitation rate. The vulnerability is not listed in the CISA KEV catalog. Exploitation is inferred to occur via malicious web content rendered in Safari or any WebKitGTK‑based browser; an attacker could embed specially crafted HTML or JavaScript to trigger the crash, resulting in a denial of service for the targeted user rather than code execution.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN