Impact
This vulnerability occurs when WebKitGTK processes maliciously crafted web content and fails to enforce proper bounds checking on memory structures. The resulting memory corruption allows an attacker to overwrite arbitrary memory, potentially leading to execution of attacker code, data modification, or denial of service. The weakness corresponds to CWE‑119, CWE‑120 and CWE‑787.
Affected Systems
Apple products that incorporate WebKitGTK, specifically Safari, as well as the web engines in iOS, iPadOS, macOS, tvOS, visionOS and watchOS, are impacted. The affected firmware versions are Safari 26.1, iOS 18.7.2 and iOS 26.1, iPadOS 18.7.2 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1 and watchOS 26.1. Systems running any of these releases are susceptible when rendering web pages that contain malicious code.
Risk and Exploitability
The CVSS score of 8.8 flags a high severity vulnerability, while the EPSS score of less than 1 % indicates a low current likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to deliver crafted web content to a user’s browser, thus the primary launch vector is the rendering of malicious web pages. Successful exploitation could corrupt memory sufficient to gain arbitrary code execution or cause a crash.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN