Impact
The flaw results from improper state handling while parsing web pages, allowing attackers to craft malicious content that bypasses the browser’s Content Security Policy enforcement. This can lead to execution of unauthorized scripts or loading of disallowed resources, creating a pathway for cross‑site scripting or other code‑execution attacks.
Affected Systems
The problem exists in Apple’s Safari browser, iOS and iPadOS, macOS, tvOS, visionOS and watchOS. Specifically, the unpatched versions are Safari 26.4, iOS 18.7.7 and iOS 26.4, iPadOS 18.7.7 and iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4 and watchOS 26.4. Updating to the listed releases removes the vulnerability.
Risk and Exploitability
The CVSS score of 6.5 indicates moderate severity while the EPSS score of less than 1% reflects a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Even without known widespread exploitation, the attack vector likely involves a user visiting a malicious or compromised web page, so timely remediation is recommended.
OpenCVE Enrichment