Impact
The vulnerability is a flaw in WebKitGTK that allows a malicious web site to access and exfiltrate data from a user’s browser across origin boundaries. This flaw corresponds to information‑leak weaknesses (CWE‑200) and cross‑origin data access weaknesses (CWE‑942). Attackers could read confidential information such as cookies or credentials and send it to an external server, compromising the confidentiality of the user session. The flaw exists in the browser engine until the security update that shipped Safari 26.1, iOS 26.1, iPadOS 26.1, macOS 26.1, tvOS 26.1, visionOS 26.1, and watchOS 26.1.
Affected Systems
The impacted products are Apple Safari on all supported platforms, as well as iOS, iPadOS, macOS, tvOS, visionOS, and watchOS. Versions prior to 26.1 on each platform are affected; the security fix was added in the 26.1 releases.
Risk and Exploitability
The CVSS base score is 8.1, and the EPSS score is less than 1 %, indicating a low probability of exploitation in the wild. The flaw is not listed in CISA’s KEV catalog. An attacker would need to host a malicious web page and lure a user to visit it in the affected browser. Once the page is loaded, the attacker can read data from cross‑origin web views and exfiltrate it to a location of their choosing. Because the vulnerability is purely a data‑leak issue, it requires user interaction but does not grant arbitrary code execution.
OpenCVE Enrichment