Impact
A use‑after‑free flaw within WebKit’s memory handling was identified. An attacker can craft malicious web content that triggers the flaw, leading to an unhandled crash of Safari. The breach does not provide execution privileges or access to sensitive data; the consequence is service disruption for the user’s browser session and potential impact on applications that depend on Safari being available.
Affected Systems
Apple’s Safari web browser, available on macOS, iOS, and iPadOS. The issue is fixed in Safari 26, iOS 26, iPadOS 26 and macOS Tahoe 26, so any versions prior to these are vulnerable.
Risk and Exploitability
The CVSS score of 4.3 indicates low‑to‑moderate severity, and an EPSS score below 1% suggests a very low likelihood of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires an attacker to serve or embed specially crafted content in a web page that the user visits or loads, making the attack vector likely network or local page consumption; however, it does not give the attacker any further privileges or control.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN