Description
The issue was addressed with improved checks. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. A malicious website may exfiltrate data cross-origin.
Published: 2025-05-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Data Exfiltration via Cross‑Origin Leakage
Action: Patch Immediately
AI Analysis

Impact

A malicious website can exfiltrate data across origins, leaking any information that a web page can access. The flaw is client‑side and does not lead to code execution but violates confidentiality by allowing data to be sent to an external domain. The weakness aligns with CWE‑200 and has been mitigated by stricter origin checks in the fixed releases.

Affected Systems

Apple Safari, iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are impacted. Fixed versions are Safari 18.5, iOS 18.5, iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, and watchOS 11.5. Red‑Hat Enterprise Linux distributions (RHEL 8/9 and derivatives) that ship the WebKitGTK engine may also be affected, as the component is listed in the CPE set and could contain the vulnerable code.

Risk and Exploitability

The CVSS score of 6.5 places the issue in the medium severity range, while the EPSS score of less than 1 % indicates a very low likelihood of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a user visiting a crafted website or an application embedding WebKitGTK to load a malicious resource; once the page is rendered, the attacker can retrieve confidential data. No privilege escalation is required and the impact is limited to confidentiality, though the core nature of the flaw means any application using the affected engine could be exposed.

Generated by OpenCVE AI on April 28, 2026 at 01:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Apple releases that contain the WebKitGTK fix: Safari 18.5 or later, iOS 18.5 or later, iPadOS 18.5 or later, macOS Sequoia 15.5 or later, tvOS 18.5 or later, visionOS 2.5 or later, and watchOS 11.5 or later. If an immediate OS or browser upgrade is not possible, configure cross‑origin policies in web content—such as setting origin‑agent‑clone or strict content‑security‑policy headers—to restrict data leakage from untrusted sites. Monitor outbound traffic on client devices for unusual cross‑origin requests to known malicious domains, and apply network controls or alerts to block or flag such activity.

Generated by OpenCVE AI on April 28, 2026 at 01:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4218-1 webkit2gtk security update
Debian DSA Debian DSA DSA-5937-1 webkit2gtk security update
EUVD EUVD EUVD-2025-14394 The issue was addressed with improved checks. This issue is fixed in watchOS 11.5, tvOS 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. A malicious website may exfiltrate data cross-origin.
Ubuntu USN Ubuntu USN USN-7566-1 WebKitGTK vulnerabilities
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in watchOS 11.5, tvOS 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. A malicious website may exfiltrate data cross-origin. The issue was addressed with improved checks. This issue is fixed in Safari 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5, visionOS 2.5, watchOS 11.5. A malicious website may exfiltrate data cross-origin.

Mon, 03 Nov 2025 20:30:00 +0000


Mon, 07 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Els
CPEs cpe:/o:redhat:rhel_els:7
Vendors & Products Redhat rhel Els

Fri, 06 Jun 2025 22:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus
CPEs cpe:/a:redhat:rhel_aus:8.4
cpe:/a:redhat:rhel_aus:8.6
cpe:/a:redhat:rhel_e4s:8.6
cpe:/a:redhat:rhel_e4s:8.8
cpe:/a:redhat:rhel_e4s:9.0
cpe:/a:redhat:rhel_e4s:9.2
cpe:/a:redhat:rhel_eus:9.4
cpe:/a:redhat:rhel_tus:8.6
cpe:/a:redhat:rhel_tus:8.8
Vendors & Products Redhat rhel Aus
Redhat rhel E4s
Redhat rhel Eus
Redhat rhel Tus

Tue, 27 May 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ipados
Apple iphone Os
Apple macos
Apple safari
Apple tvos
Apple visionos
Apple watchos
CPEs cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple
Apple ipados
Apple iphone Os
Apple macos
Apple safari
Apple tvos
Apple visionos
Apple watchos

Wed, 21 May 2025 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/a:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Fri, 16 May 2025 02:30:00 +0000

Type Values Removed Values Added
Title webkitgtk: A malicious website may exfiltrate data cross-origin
Weaknesses CWE-200
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 13 May 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-352
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 12 May 2025 21:45:00 +0000

Type Values Removed Values Added
Description The issue was addressed with improved checks. This issue is fixed in watchOS 11.5, tvOS 18.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, visionOS 2.5, Safari 18.5. A malicious website may exfiltrate data cross-origin.
References

Subscriptions

Apple Ipados Iphone Os Macos Safari Tvos Visionos Watchos
Redhat Enterprise Linux Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:12:38.723Z

Reserved: 2025-03-27T16:13:58.315Z

Link: CVE-2025-31205

cve-icon Vulnrichment

Updated: 2025-11-03T19:48:36.545Z

cve-icon NVD

Status : Modified

Published: 2025-05-12T22:15:21.627

Modified: 2026-04-02T19:19:47.330

Link: CVE-2025-31205

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-05-15T00:00:00Z

Links: CVE-2025-31205 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T02:00:15Z

Weaknesses