Impact
A use‑after‑free bug in WebKitGTK was identified in Safari and related Apple browsers. The flaw arises from insufficient memory cleanup after removal of a memory reference, causing a crash when the browser processes specially crafted web content. The primary outcome is a denial‑of‑service because the targeted browser terminates unexpectedly, disrupting user sessions and potentially leading to broader availability issues for services dependent on the browser.
Affected Systems
Affected vendors include Apple with the Safari web browser and the operating systems Apple iOS, iPadOS, macOS, visionOS, and watchOS. The vulnerability is fixed in Safari 26.1, iOS 26.1, iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, and watchOS 26.1. Earlier releases before these versions remain susceptible.
Risk and Exploitability
The CVSS rating of 6.5 labels the bug as moderately severe, and an EPSS score of less than 1% indicates a very low exploitation probability. It is not listed in the CISA KEV catalog. The attack is most likely carried out remotely via malicious web content delivered over the network, making it exploitable by any compromised or malicious website visited by a user running one of the affected Apple platforms.
OpenCVE Enrichment
Debian DLA
Debian DSA