Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24180: A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix in Apple Safari

0
High
VulnerabilityCVE-2025-24180cvecve-2025-24180
Published: Mon Mar 31 2025 (03/31/2025, 22:23:12 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

The issue was addressed with improved input validation. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, visionOS 2.4, watchOS 11.4. A malicious website may be able to claim WebAuthn credentials from another website that shares a registrable suffix.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:43:23 UTC

Technical Analysis

CVE-2025-24180 is a vulnerability in Apple Safari's implementation of WebAuthn, a web authentication standard that enables secure, passwordless login using public key cryptography. The flaw arises because Safari failed to properly validate the origin of WebAuthn credentials when websites share a registrable suffix (e.g., example.com and example.co). This improper input validation allows a malicious website to impersonate or claim WebAuthn credentials that belong to another legitimate website under the same registrable suffix. Essentially, an attacker controlling a malicious site can trick Safari into associating the victim's WebAuthn credentials with the attacker’s domain, thereby stealing or misusing these credentials. The vulnerability affects Safari on multiple Apple platforms including iOS, iPadOS, macOS Sequoia, visionOS, and watchOS prior to version 18.4 (or equivalent OS versions). The issue was resolved by Apple through improved input validation mechanisms in Safari 18.4 and corresponding OS updates released in early 2025. The CVSS 3.1 base score of 8.1 reflects the network attack vector, low attack complexity, no privileges required, but requiring user interaction, with high impact on confidentiality and integrity but no impact on availability. This vulnerability is categorized under CWE-601 (URL Redirection to Untrusted Site), indicating a logic flaw in origin validation. No known exploits have been reported in the wild as of the publication date.

Potential Impact

The primary impact of this vulnerability is the compromise of WebAuthn credentials, which are critical for secure, passwordless authentication. If exploited, attackers can impersonate legitimate users on affected websites, gaining unauthorized access to sensitive accounts and services. This undermines the confidentiality and integrity of user authentication data, potentially leading to account takeover, data breaches, and unauthorized transactions. Organizations relying on Safari for WebAuthn-based authentication, especially those in finance, healthcare, and enterprise sectors, face increased risk of credential theft and subsequent fraud. Since the vulnerability affects multiple Apple platforms, the scope is broad, impacting users on desktops, mobile devices, and emerging platforms like visionOS. Although exploitation requires user interaction, the ease of triggering the flaw via malicious websites makes phishing or drive-by attacks feasible. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits post-disclosure. Failure to patch promptly could result in significant reputational damage and financial loss for organizations.

Mitigation Recommendations

Organizations and users should prioritize updating Safari to version 18.4 or later and ensure all Apple devices run the corresponding OS updates (iOS 18.4, iPadOS 18.4, macOS Sequoia 15.4, visionOS 2.4, watchOS 11.4). Beyond patching, organizations should implement strict Content Security Policies (CSP) to restrict loading of untrusted scripts and reduce exposure to malicious websites. Web developers should review their use of registrable suffixes and consider isolating WebAuthn credentials by employing site isolation techniques or subdomain segregation to minimize cross-origin risks. User education on phishing and suspicious websites can reduce the likelihood of user interaction with malicious sites. Monitoring web traffic for unusual WebAuthn requests or anomalies may help detect exploitation attempts. Additionally, organizations should consider multi-factor authentication fallback mechanisms and continuous authentication monitoring to detect unauthorized access even if credentials are compromised.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:44.993Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091538c28fd46ded7baa29

Added to database: 11/3/2025, 8:48:56 PM

Last enriched: 4/3/2026, 12:43:23 AM

Last updated: 5/9/2026, 8:32:28 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses