Impact
A buffer overflow was discovered in WebKitGTK due to insufficient bounds checking during the processing of maliciously crafted web content. Exploit of this flaw leads to an unexpected process crash, causing a denial of service for the affected browser or web view. The vulnerability is a classic buffer overrun (CWE‑119/CWE‑120) that does not provide an attacker with code execution or data disclosure, but it can reliably destabilize the user experience.
Affected Systems
The issue affects Apple products that use WebKitGTK components: Safari, iOS/iPadOS, macOS, tvOS, visionOS, and watchOS. The flaw was fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS 26.1, tvOS 26.1, visionOS 26.1, and watchOS 26.1. Devices running older versions are still vulnerable.
Risk and Exploitability
The CVSS score is 4.3, ranking the vulnerability as medium in severity. The EPSS score is less than 1 %, indicating a very low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. The likely attack vector is the delivery of specially crafted web content to a browser or application that relies on WebKitGTK; a successful exploit results in a process crash but does not provide remote code execution or privilege escalation.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN