CVE-2025-43480
BaseFortify
Publication date: 2025-11-04
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 26.1 (exc) |
| apple | ipados | to 26.1 (exc) |
| apple | iphone_os | to 26.1 (exc) |
| apple | tvos | to 26.1 (exc) |
| apple | visionos | to 26.1 (exc) |
| apple | watchos | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-942 | The product uses a web-client protection mechanism such as a Content Security Policy (CSP) or cross-domain policy file, but the policy includes untrusted domains with which the web client is allowed to communicate. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a security flaw where a malicious website can exfiltrate data across origins, meaning it can access data from other websites or sources without permission. The issue was addressed by implementing improved checks in affected Apple software versions.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow a malicious website to steal sensitive data from other websites or services you use, potentially compromising your personal information or security.
What immediate steps should I take to mitigate this vulnerability?
Update affected Apple products to version 26.1 or later, including Safari, visionOS, watchOS, iOS, iPadOS, and tvOS, to apply the fix that addresses this vulnerability.