Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-24208: Loading a malicious iframe may lead to a cross-site scripting attack in Apple Safari

0
Medium
VulnerabilityCVE-2025-24208cvecve-2025-24208
Published: Mon Mar 31 2025 (03/31/2025, 22:23:30 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

A permissions issue was addressed with additional restrictions. This issue is fixed in Safari 18.4, iOS 18.4 and iPadOS 18.4. Loading a malicious iframe may lead to a cross-site scripting attack.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 00:48:44 UTC

Technical Analysis

CVE-2025-24208 is a cross-site scripting (XSS) vulnerability identified in Apple Safari browsers before version 18.4, including iOS and iPadOS variants. The root cause is a permissions issue that allows a malicious iframe embedded within a webpage to bypass security restrictions and execute arbitrary scripts in the context of the victim's browser session. This can lead to unauthorized access to sensitive information, such as cookies, session tokens, or other data accessible via the browser, compromising confidentiality and integrity. The attack vector requires the victim to load a webpage containing the malicious iframe, thus user interaction is necessary. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common web security flaw. Apple resolved this issue by introducing additional permission restrictions in Safari 18.4 and corresponding iOS and iPadOS updates, effectively preventing malicious iframes from executing unauthorized scripts. The CVSS v3.1 base score is 6.1, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, but requiring user interaction. No public exploits or active exploitation campaigns have been reported to date. This vulnerability underscores the importance of secure iframe handling and strict content security policies in modern browsers to prevent XSS attacks.

Potential Impact

The primary impact of CVE-2025-24208 is on the confidentiality and integrity of user data accessed through Safari browsers. Successful exploitation allows attackers to execute arbitrary scripts via malicious iframes, potentially stealing sensitive information such as authentication tokens, personal data, or performing actions on behalf of the user. This can lead to session hijacking, identity theft, or unauthorized transactions. Although availability is not directly affected, the breach of trust and data compromise can have significant reputational and financial consequences for organizations. Enterprises relying on Safari for internal or customer-facing applications may face increased risk of targeted phishing or drive-by download attacks exploiting this vulnerability. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments with high user exposure to web content. The lack of known exploits in the wild suggests limited immediate threat, but the widespread use of Safari on Apple devices globally means the vulnerability could be leveraged in future targeted attacks if unpatched.

Mitigation Recommendations

To mitigate CVE-2025-24208, organizations and users should promptly update all Apple Safari browsers to version 18.4 or later, including iOS and iPadOS devices. Enforcing automatic updates on managed devices can ensure timely patch deployment. Web administrators should implement strict Content Security Policies (CSP) that restrict iframe sources and disallow inline scripts to reduce the risk of malicious iframe injection. Employing browser security features such as SameSite cookies and enabling anti-XSS filters can provide additional layers of defense. User education to avoid clicking on suspicious links or visiting untrusted websites can reduce exposure to malicious iframes. For organizations developing web applications, sanitizing and validating all user-generated content and iframe sources is critical. Monitoring web traffic for unusual iframe activity and employing web application firewalls (WAFs) with XSS detection rules can help detect and block exploitation attempts. Finally, conducting regular security assessments and penetration testing focusing on iframe and script injection vulnerabilities will improve overall resilience.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-01-17T00:00:45.001Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69091539c28fd46ded7bac01

Added to database: 11/3/2025, 8:48:57 PM

Last enriched: 4/3/2026, 12:48:44 AM

Last updated: 5/11/2026, 9:15:40 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses