Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20643: Processing maliciously crafted web content may bypass Same Origin Policy in Apple Safari

0
Medium
VulnerabilityCVE-2026-20643cvecve-2026-20643
Published: Tue Mar 17 2026 (03/17/2026, 22:29:48 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS, iPadOS, and macOS, Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. Processing maliciously crafted web content may bypass Same Origin Policy.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 02:53:57 UTC

Technical Analysis

CVE-2026-20643 is a vulnerability identified in Apple Safari's Navigation API that allows bypassing the Same Origin Policy (SOP) due to inadequate input validation. The SOP is a critical security mechanism that restricts how documents or scripts loaded from one origin can interact with resources from another origin, preventing malicious cross-origin data access. This vulnerability stems from a cross-origin issue where specially crafted web content can manipulate the Navigation API to circumvent these restrictions. Affected versions include Safari 26.4 and earlier on iOS, iPadOS, macOS, and visionOS platforms. The flaw is categorized under CWE-20 (Improper Input Validation) and CWE-346 (Origin Validation Error), indicating that the root cause is insufficient validation of input parameters related to navigation and origin checks. Exploitation requires no privileges and no authentication but does require user interaction, such as visiting a maliciously crafted webpage. The impact primarily affects confidentiality and integrity by potentially exposing or manipulating cross-origin data that should be inaccessible. Apple has fixed this issue by implementing improved input validation in the Navigation API as part of Background Security Improvements in the specified OS and Safari versions. There are currently no known exploits in the wild, but the vulnerability's nature makes it a concern for web security and privacy.

Potential Impact

The vulnerability allows attackers to bypass the Same Origin Policy, a foundational web security control, potentially enabling unauthorized access to sensitive data across different web origins. This can lead to information disclosure where malicious sites read data from other sites the user is logged into, such as session tokens, personal information, or confidential business data. Additionally, it may allow attackers to manipulate or inject unauthorized content, impacting data integrity. Although the vulnerability does not affect availability, the breach of confidentiality and integrity can facilitate further attacks like session hijacking, cross-site request forgery, or phishing. Organizations with employees or customers using vulnerable Safari versions are at risk, especially those handling sensitive or regulated data. The requirement for user interaction limits automated exploitation but does not eliminate risk, as social engineering can induce users to visit malicious sites. The absence of known exploits reduces immediate threat but patching is critical to prevent future attacks. The impact is significant for sectors relying heavily on Safari, including enterprises, government agencies, and users in regions with high Apple device penetration.

Mitigation Recommendations

Organizations and users should promptly update Safari and their operating systems to the patched versions: Safari 26.4, iOS 18.7.7 and 26.4, iPadOS 18.7.7 and 26.4, macOS Tahoe 26.4, and visionOS 26.4. Enforce strict update policies for Apple devices to ensure timely deployment of security patches. Employ web content filtering and monitoring to detect and block access to known malicious sites that could exploit this vulnerability. Educate users about the risks of interacting with untrusted websites and encourage cautious browsing behavior. Implement Content Security Policy (CSP) headers on organizational web applications to restrict the execution of unauthorized scripts and reduce the impact of cross-origin attacks. Use network-level protections such as DNS filtering and secure web gateways to reduce exposure to malicious web content. Monitor browser telemetry and logs for unusual cross-origin requests or navigation behaviors that could indicate exploitation attempts. For high-security environments, consider restricting or controlling the use of Safari until patches are applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.862Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b9d90c771bdb1749de4be8

Added to database: 3/17/2026, 10:43:24 PM

Last enriched: 4/3/2026, 2:53:57 AM

Last updated: 5/1/2026, 7:27:51 PM

Views: 228

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses