Impact
A use‑after‑free flaw was discovered in WebKitGTK that can be triggered by maliciously crafted web content. Exploitation results in an unexpected Safari crash, which may lead to a denial of service for the affected user session. The weakness is classified as CWE‑416 and does not provide an escape from sandboxed execution or remote code execution.
Affected Systems
Apple’s Safari browser and all related OS platforms—iOS, iPadOS, macOS, visionOS and watchOS—are impacted. The vulnerability is fixed starting with Safari 26.1, iOS and iPadOS 18.7.2, macOS Tahoe 26.1, visionOS 26.1 and watchOS 26.1. Devices running earlier releases of these products are susceptible.
Risk and Exploitability
The CVSS score of 4.3 indicates a moderate impact primarily limited to service interruption. The EPSS score is below 1 %, suggesting that the exploitation probability is very low in the current threat landscape. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector involves an attacker hosting or supplying malicious web content that a user’s Safari instance parses, leading to a crash. No additional prerequisites beyond normal web browsing are required.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN