CVE-2025-43493
BaseFortify
Publication date: 2025-11-04
Last updated on: 2026-04-02
Assigner: Apple Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apple | safari | to 26.1 (exc) |
| apple | ipados | to 26.1 (exc) |
| apple | iphone_os | to 26.1 (exc) |
| apple | visionos | to 26.1 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves address bar spoofing that can occur when visiting a malicious website. It was addressed by improved checks and fixed in iOS 26.1, iPadOS 26.1, Safari 26.1, and visionOS 26.1.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing a malicious website to spoof the address bar, potentially misleading users about the actual website they are visiting, which could lead to phishing or other deceptive attacks.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update your devices to iOS 26.1, iPadOS 26.1, Safari 26.1, or visionOS 26.1 as these versions include the fix with improved checks to prevent address bar spoofing.