Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-20656: An app may be able to access a user's Safari history in Apple Safari

0
Low
VulnerabilityCVE-2026-20656cvecve-2026-20656
Published: Wed Feb 11 2026 (02/11/2026, 22:58:23 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, Safari 26.3, macOS Tahoe 26.3. An app may be able to access a user's Safari history.

AI-Powered Analysis

AILast updated: 02/19/2026, 12:47:00 UTC

Technical Analysis

CVE-2026-20656 is a logic flaw in Apple Safari that allows a local application with limited privileges to access the user's browsing history without proper authorization. The root cause is inadequate validation in Safari's handling of history data, which could be exploited by an app to bypass intended access controls. This vulnerability affects Safari on iOS, iPadOS, and macOS platforms prior to versions iOS 18.7.5, iPadOS 18.7.5, and Safari 26.3 on macOS Tahoe 26.3. The issue was identified and addressed by Apple through improved validation mechanisms that restrict unauthorized access to browsing history. The vulnerability is classified under CWE-285 (Improper Authorization). The CVSS v3.1 base score is 3.3, indicating low severity due to the requirement for local privileges (AV:L), low attack complexity (AC:L), and no user interaction (UI:N). The impact is limited to confidentiality loss of browsing history, with no effect on integrity or availability. No public exploits have been reported, and the flaw was reserved in November 2025 and published in February 2026. This vulnerability primarily poses a privacy risk, potentially exposing sensitive browsing data to malicious local apps.

Potential Impact

The primary impact of CVE-2026-20656 is the unauthorized disclosure of a user's Safari browsing history, which compromises user privacy and confidentiality. For organizations, this could lead to exposure of sensitive or proprietary information if employees use Safari on vulnerable Apple devices and run untrusted local applications. Although the vulnerability does not affect data integrity or system availability, the leakage of browsing history can facilitate targeted phishing, social engineering, or further attacks by revealing user interests, habits, or confidential research. The requirement for local privileges limits remote exploitation, reducing the overall risk to enterprise networks. However, in environments where devices are shared or where malicious insiders or compromised apps exist, the threat is more significant. The absence of known exploits in the wild suggests limited active exploitation, but the vulnerability should still be addressed promptly to maintain user trust and data privacy compliance.

Mitigation Recommendations

To mitigate CVE-2026-20656, organizations and users should immediately update affected Apple devices to iOS 18.7.5, iPadOS 18.7.5, and Safari 26.3 on macOS Tahoe 26.3 or later, where the vulnerability is fixed. Beyond patching, organizations should enforce strict application control policies, such as using Apple’s MDM solutions to restrict installation of untrusted or unsigned apps that could exploit local vulnerabilities. Employing endpoint protection that monitors and restricts app behaviors accessing sensitive data can further reduce risk. Regularly auditing installed applications and their permissions helps identify potential threats. User education on the risks of installing unverified apps and the importance of timely updates is also critical. For high-security environments, consider disabling Safari history synchronization or using privacy-focused browsing modes to limit data exposure. Finally, monitor device logs for unusual local app activity that might indicate attempts to access browsing history.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-11-11T14:43:07.865Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698d0dcc4b57a58fa1d960c1

Added to database: 2/11/2026, 11:16:28 PM

Last enriched: 2/19/2026, 12:47:00 PM

Last updated: 2/21/2026, 12:19:32 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats