Impact
A memory handling flaw in WebKitGTK causes processes to crash when a web page contains maliciously crafted content. The bug can trigger buffer overflows, underflows, use‑after‑free, or out‑of‑bounds writes, resulting in unauthorized disruption of the affected web rendering process. The primary impact is loss of availability, as end users experience application crashes without data loss or exposure of sensitive information.
Affected Systems
Apple products running Safari, iOS, iPadOS, macOS, and visionOS are vulnerable. Tested versions below Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 are affected. The issue is fixed in the 26.4 release series for all listed operating systems and browsers.
Risk and Exploitability
The CVSS base score is 6.5, indicating medium severity. The EPSS score is less than 1 %, implying a low probability of exploitation in the wild. The vulnerability is not cataloged in CISA’s KEV list. Based on the description, it is inferred that the attack vector is remote, requiring delivery of malicious content via a web page or application that renders with WebKitGTK.
OpenCVE Enrichment