CVE-2025-46316: Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory in Apple Pages
An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.
AI Analysis
Technical Summary
CVE-2025-46316 is a vulnerability identified in Apple Pages, Apple's word processing application available on macOS, iOS, and iPadOS platforms. The root cause is an out-of-bounds read (CWE-125), which occurs when the application processes a maliciously crafted Pages document. This vulnerability stems from insufficient input validation, allowing the application to read memory outside the intended buffer boundaries. Such out-of-bounds reads can lead to unexpected termination of the Pages process (application crash) or disclosure of process memory contents. The latter can potentially expose sensitive information residing in memory, such as document data or other in-memory secrets. The vulnerability affects Apple Pages versions prior to 15.1 on macOS Tahoe 26.1, iOS 26.1, and iPadOS 26.1. Apple has fixed the issue by improving input validation in these versions. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) to open the malicious document. The scope is unchanged (S:U), and the impact is limited to availability (A:L) with no confidentiality or integrity impact (C:N, I:N). There are no known exploits in the wild, and no public patch links were provided in the source data, but users are advised to update to the fixed versions. This vulnerability highlights the risks of processing untrusted document files and the importance of robust input validation in document parsers.
Potential Impact
The primary impact of CVE-2025-46316 is on application availability and potential information disclosure. When a user opens a maliciously crafted Pages document, the application may crash unexpectedly, disrupting productivity and potentially causing data loss if unsaved work is lost. More critically, the out-of-bounds read can disclose portions of process memory, which might contain sensitive information such as document contents, user data, or other in-memory secrets. Although the vulnerability does not allow direct code execution or privilege escalation, the information leakage could aid attackers in further attacks or reconnaissance. Organizations relying heavily on Apple Pages for document creation and editing, especially in environments handling sensitive or confidential information, face risks of data exposure and operational disruption. Since exploitation requires user interaction (opening a malicious document), phishing or social engineering campaigns could be used to deliver the payload. The lack of known exploits in the wild reduces immediate risk, but the medium severity score and potential for information leakage warrant timely mitigation. Enterprises with Apple device fleets should prioritize patching to maintain operational stability and data confidentiality.
Mitigation Recommendations
To mitigate CVE-2025-46316, organizations and users should promptly update Apple Pages to version 15.1 or later on macOS Tahoe 26.1, iOS 26.1, and iPadOS 26.1 or newer. Ensure that all Apple devices are running the latest OS versions that include the patched Pages application. Implement strict email and document filtering policies to block or quarantine suspicious or unsolicited Pages documents from unknown or untrusted sources. Educate users about the risks of opening documents from unverified senders to reduce the likelihood of social engineering exploitation. Employ endpoint protection solutions capable of detecting anomalous application crashes or memory disclosures. Where feasible, restrict the use of Pages documents in high-risk environments or use sandboxing technologies to limit the impact of potential crashes or memory leaks. Regularly audit and monitor logs for unusual application behavior or crashes related to Pages. Finally, maintain an incident response plan that includes procedures for handling suspected exploitation of document parsing vulnerabilities.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, China, India, Brazil
CVE-2025-46316: Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory in Apple Pages
Description
An out-of-bounds read was addressed with improved input validation. This issue is fixed in Pages 15.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1. Processing a maliciously crafted Pages document may result in unexpected termination or disclosure of process memory.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-46316 is a vulnerability identified in Apple Pages, Apple's word processing application available on macOS, iOS, and iPadOS platforms. The root cause is an out-of-bounds read (CWE-125), which occurs when the application processes a maliciously crafted Pages document. This vulnerability stems from insufficient input validation, allowing the application to read memory outside the intended buffer boundaries. Such out-of-bounds reads can lead to unexpected termination of the Pages process (application crash) or disclosure of process memory contents. The latter can potentially expose sensitive information residing in memory, such as document data or other in-memory secrets. The vulnerability affects Apple Pages versions prior to 15.1 on macOS Tahoe 26.1, iOS 26.1, and iPadOS 26.1. Apple has fixed the issue by improving input validation in these versions. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R) to open the malicious document. The scope is unchanged (S:U), and the impact is limited to availability (A:L) with no confidentiality or integrity impact (C:N, I:N). There are no known exploits in the wild, and no public patch links were provided in the source data, but users are advised to update to the fixed versions. This vulnerability highlights the risks of processing untrusted document files and the importance of robust input validation in document parsers.
Potential Impact
The primary impact of CVE-2025-46316 is on application availability and potential information disclosure. When a user opens a maliciously crafted Pages document, the application may crash unexpectedly, disrupting productivity and potentially causing data loss if unsaved work is lost. More critically, the out-of-bounds read can disclose portions of process memory, which might contain sensitive information such as document contents, user data, or other in-memory secrets. Although the vulnerability does not allow direct code execution or privilege escalation, the information leakage could aid attackers in further attacks or reconnaissance. Organizations relying heavily on Apple Pages for document creation and editing, especially in environments handling sensitive or confidential information, face risks of data exposure and operational disruption. Since exploitation requires user interaction (opening a malicious document), phishing or social engineering campaigns could be used to deliver the payload. The lack of known exploits in the wild reduces immediate risk, but the medium severity score and potential for information leakage warrant timely mitigation. Enterprises with Apple device fleets should prioritize patching to maintain operational stability and data confidentiality.
Mitigation Recommendations
To mitigate CVE-2025-46316, organizations and users should promptly update Apple Pages to version 15.1 or later on macOS Tahoe 26.1, iOS 26.1, and iPadOS 26.1 or newer. Ensure that all Apple devices are running the latest OS versions that include the patched Pages application. Implement strict email and document filtering policies to block or quarantine suspicious or unsolicited Pages documents from unknown or untrusted sources. Educate users about the risks of opening documents from unverified senders to reduce the likelihood of social engineering exploitation. Employ endpoint protection solutions capable of detecting anomalous application crashes or memory disclosures. Where feasible, restrict the use of Pages documents in high-risk environments or use sandboxing technologies to limit the impact of potential crashes or memory leaks. Regularly audit and monitor logs for unusual application behavior or crashes related to Pages. Finally, maintain an incident response plan that includes procedures for handling suspected exploitation of document parsing vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2025-04-22T21:13:49.961Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697a4c814623b1157cded9ce
Added to database: 1/28/2026, 5:50:57 PM
Last enriched: 4/3/2026, 2:45:04 AM
Last updated: 5/8/2026, 4:50:53 PM
Views: 310
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.