Impact
A flaw in WebKitGTK's processing of maliciously crafted web content can corrupt memory during rendering. The memory corruption could destabilize the browser or any process using WebKitGTK and may enable attackers to execute arbitrary code or crash applications. The associated weakness is a classic buffer overflow (CWE‑119).
Affected Systems
The vulnerability affects Apple's Safari browser on macOS, tvOS, watchOS, visionOS, iOS, and iPadOS. Patching versions are Safari 18.6, iOS 18.6 and iPadOS 18.6, iPadOS 17.7.9, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, and watchOS 11.6. Devices running earlier releases of these OSes or Safari are potentially impacted.
Risk and Exploitability
The CVSS base score of 8.8 marks this as a high‑severity issue. The EPSS score is below 1 %, indicating a very low probability of exploitation in the wild, and it is not currently listed in CISA's KEV catalog. Attackers would need to deliver malicious web content that is rendered by WebKitGTK, so user interaction with a compromised site is likely required. If triggered, the memory corruption can be used to escape sandbox boundaries or crash the affected application.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN