Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may disclose internal states of the app.
Published: 2025-07-29
Score: 4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Now
AI Analysis

Impact

An out-of-bounds read in the WebKitGTK engine can be triggered by maliciously crafted web content. The flaw allows an attacker to read memory contents beyond the intended buffer and may expose internal state information of the application. The weakness is identified as CWE-125 and can lead to the leak of sensitive data within the browser or webview context, but does not provide execution or denial of service capabilities.

Affected Systems

Apple Safari, iOS, iPadOS, macOS, tvOS, visionOS, and watchOS are affected. The vulnerability exists in Safari versions prior to 18.6, iOS and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, and watchOS 11.6, which are the versions that contain the fixed input validation logic.

Risk and Exploitability

The CVSS score of 4.0 denotes a low to moderate risk, and the EPSS score of less than 1% indicates a low probability of exploitation in the wild. The vulnerability is not listed on the CISA KEV catalog. The likely attack vector involves delivering malicious web content via a web page or embedded web view that the user visits, which is an inferred scenario because the CVE statement specifies that processing maliciously crafted content may disclose internal states.

Generated by OpenCVE AI on April 28, 2026 at 00:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Safari to version 18.6 or later, and upgrade iOS and iPadOS to 18.6.
  • Apply the macOS Sequoia 15.6 update, and upgrade tvOS to 18.6, visionOS to 2.6, and watchOS to 11.6.
  • If an update is not immediately possible, restrict or block the loading of untrusted web content in the affected applications and monitor for suspicious page loads.

Generated by OpenCVE AI on April 28, 2026 at 00:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4276-1 webkit2gtk security update
Debian DSA Debian DSA DSA-5978-1 webkit2gtk security update
EUVD EUVD EUVD-2025-23088 An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may disclose internal states of the app.
Ubuntu USN Ubuntu USN USN-7702-1 WebKitGTK vulnerabilities
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may disclose internal states of the app. An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6, visionOS 2.6, watchOS 11.6. Processing maliciously crafted web content may disclose internal states of the app.

Tue, 04 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Mon, 03 Nov 2025 20:30:00 +0000


Mon, 03 Nov 2025 19:30:00 +0000

Type Values Removed Values Added
References

Tue, 05 Aug 2025 00:15:00 +0000

Type Values Removed Values Added
Title webkitgtk: Processing maliciously crafted web content may disclose internal states of the app
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 01 Aug 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Apple ipados
Apple iphone Os
Apple safari
CPEs cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
Vendors & Products Apple ipados
Apple iphone Os
Apple safari

Wed, 30 Jul 2025 23:00:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may disclose internal states of the app. An out-of-bounds read was addressed with improved input validation. This issue is fixed in Safari 18.6, watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may disclose internal states of the app.
References

Wed, 30 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-125
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 30 Jul 2025 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios And Ipados
Apple macos
Apple macos Sequoia
Apple tvos
Apple visionos
Apple watchos
Vendors & Products Apple
Apple ios And Ipados
Apple macos
Apple macos Sequoia
Apple tvos
Apple visionos
Apple watchos

Wed, 30 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
Description An out-of-bounds read was addressed with improved input validation. This issue is fixed in watchOS 11.6, visionOS 2.6, iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6, tvOS 18.6. Processing maliciously crafted web content may disclose internal states of the app.
References

Subscriptions

Apple Ios And Ipados Ipados Iphone Os Macos Macos Sequoia Safari Tvos Visionos Watchos
cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:15:10.992Z

Reserved: 2025-04-16T15:24:37.100Z

Link: CVE-2025-43265

cve-icon Vulnrichment

Updated: 2025-11-04T21:10:37.478Z

cve-icon NVD

Status : Modified

Published: 2025-07-30T00:15:37.807

Modified: 2026-04-02T19:20:17.250

Link: CVE-2025-43265

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-08-01T00:00:00Z

Links: CVE-2025-43265 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:45:17Z

Weaknesses