Description
A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
Published: 2025-12-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Use‑After‑Free
Action: Immediate Patch
AI Analysis

Impact

A use‑after‑free bug in WebKitGTK’s memory management allows an attacker to crash a process that parses malicious web content. The flaw can cause the application or system process to terminate unexpectedly, resulting in a denial of service and a service interruption for the user. The vulnerability is classified as CWE‑416, a memory management error that can lead to unstable execution.

Affected Systems

Apple products including Safari, iOS, iPadOS, macOS, visionOS, and watchOS are affected. Versions prior to Safari 26.2, iOS 18.7.2 and iPadOS 18.7.2, macOS 26.2, visionOS 26.2, and watchOS 26.2 contain the issue and have not applied the fix announced by Apple.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity. The EPSS score of less than 1% suggests a very low likelihood of exploitation, and it is not listed in CISA’s KEV catalog. The vulnerability is likely to be exploited remotely through crafted web content or embedded web views, as the flaw is triggered when malicious data is processed by the web engine. In the absence of known active exploits, the risk remains primarily theoretical but should be addressed promptly to prevent potential denial‑of‑service attacks.

Generated by OpenCVE AI on April 22, 2026 at 20:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Safari 26.2, iOS 18.7.2, iPadOS 18.7.2, macOS 26.2, visionOS 26.2, or watchOS 26.2 to receive the hardened memory‑management fix.
  • If a system cannot be updated immediately, restrict exposure by disabling or sandboxing user‑controlled web content, particularly scripts that could feed crafted data to WebKitGTK.
  • Continuously monitor crash logs and system stability to detect any abnormal termination, and apply the latest security updates as soon as they become available.

Generated by OpenCVE AI on April 22, 2026 at 20:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4528-1 webkit2gtk security update
Debian DSA Debian DSA DSA-6172-1 webkit2gtk security update
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, iOS 18.7.2 and iPadOS 18.7.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash. A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.

Fri, 20 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Title webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
References
Metrics threat_severity

None

threat_severity

Important


Wed, 17 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
Description A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to an unexpected process crash. A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 26.2, Safari 26.2, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, iOS 18.7.2 and iPadOS 18.7.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
References

Wed, 17 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Apple iphone Os
CPEs cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
Vendors & Products Apple iphone Os

Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Apple
Apple ios
Apple ipados
Vendors & Products Apple
Apple ios
Apple ipados

Sat, 13 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Description A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 18.7.2 and iPadOS 18.7.2. Processing maliciously crafted web content may lead to an unexpected process crash.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apple

Published:

Updated: 2026-04-02T18:13:40.169Z

Reserved: 2025-04-16T15:27:21.195Z

Link: CVE-2025-43511

cve-icon Vulnrichment

Updated: 2025-12-13T22:35:05.819Z

cve-icon NVD

Status : Modified

Published: 2025-12-12T21:15:56.000

Modified: 2026-04-02T19:20:57.537

Link: CVE-2025-43511

cve-icon Redhat

Severity : Important

Publid Date: 2026-03-18T00:00:00Z

Links: CVE-2025-43511 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T20:45:27Z

Weaknesses