Impact
A vulnerability in WebKitGTK permits the processing of specially crafted web content to trigger a memory handling error that results in a process crash. The resulting out‑of‑bounds memory access causes the crashing process to terminate, leading to a temporary denial of service for the user’s browsing session but does not grant the attacker code execution or persistence privileges.
Affected Systems
The flaw affects Apple’s Safari browser and the WebKit-based web‑view components used on iOS, iPadOS, macOS, and visionOS. The issue is fixed in Safari 26.3, iOS 26.3, iPadOS 26.3, macOS Tahoe 26.3, and visionOS 26.3.
Risk and Exploitability
The CVSS score of 6.5 indicates a medium severity vulnerability. The EPSS score is less than 1 %, suggesting that exploitation attempts are unlikely to be prolific at present and the flaw is not listed in the CISA KEV catalog. The likely attack vector is a malicious web page or embedded content served over the network, requiring only that the victim visit the site or view the content. Once triggered, the crash is local to the user’s device and does not expose the system to further compromise.
OpenCVE Enrichment
Debian DLA
Debian DSA