Impact
A use‑after‑free bug in WebKitGTK’s memory handling is triggered by maliciously crafted web content, causing Safari to crash unexpectedly. The vulnerability is limited to an instability that results in a fatal error without any direct exploitation of code execution or data exfiltration. Affected users experience a denial of service when the browser terminates. The weakness is classified as CWE‑416 (Use‑After‑Free).
Affected Systems
Apple products such as Safari, iOS, iPadOS, macOS, visionOS, and watchOS are affected. The fix is included in Safari 26.1 and iOS/iPadOS 18.7.2 (and equivalent 26.1 releases). Those running earlier releases without this patch remain vulnerable.
Risk and Exploitability
The CVSS score of 4.3 reflects moderate severity, and an EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog, suggesting no known widespread exploitation. Attackers can trigger the crash by serving specially crafted web content to a user’s Safari. While the bug does not provide privilege escalation or data theft, the crash can disrupt availability and serve as a vector for denial of service. Given the low EPSS and absence from KEV, immediate risk to large‑scale attacks is low, but the impact on end users is measurable in the form of unexpected browser termination.
OpenCVE Enrichment