Impact
A maliciously crafted file can be processed by the operating system and trigger the execution of arbitrary JavaScript, leading to a cross‑site scripting attack. The flaw stems from insufficient input sanitization during file handling, allowing attacker‑supplied content to be executed in a browser context.
Affected Systems
Apple iOS and iPadOS are affected. The vulnerability exists in all iOS versions prior to 18.4 and in all iPadOS versions prior to 18.4. The security fix is included in iOS 18.4 and iPadOS 18.4 and is not available in earlier releases.
Risk and Exploitability
The CVSS score of 5 indicates moderate severity, while the EPSS score of less than 1% suggests a low probability of exploitation at present. The vulnerability is not listed in CISA KEV. The likely attack vector is execution of a malicious file that the user opens or that is transferred to the device through an application, email attachment, or file sharing service. Exploitation requires local file access, but once a file is processed the JavaScript can run with the privileges of the device’s web view.
OpenCVE Enrichment
EUVD