CVE-2026-28861: A malicious website may be able to access script message handlers intended for other origins in Apple Safari
A logic issue was addressed with improved state management. This issue is fixed in Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. A malicious website may be able to access script message handlers intended for other origins.
AI Analysis
Technical Summary
CVE-2026-28861 is a logic flaw in Apple Safari's handling of script message handlers, which are mechanisms used for communication between web content and native code. The vulnerability arises from improper state management that allows a malicious website to access script message handlers intended for other origins, violating the same-origin policy. This can lead to unauthorized access to data or messages that should be isolated per origin, potentially leaking sensitive information. The issue affects Safari versions prior to 26.4 on macOS Tahoe, iOS 18.7.7, iPadOS 18.7.7, visionOS 26.4, and related platforms. Exploitation requires a user to visit a crafted malicious website, but no authentication or elevated privileges are needed. Apple fixed the vulnerability by improving the internal state management of script message handlers, ensuring proper origin separation. The CVSS v3.1 score is 4.3 (medium), reflecting the limited confidentiality impact and the requirement for user interaction. No known exploits have been reported in the wild, but the vulnerability could be leveraged in targeted attacks to extract limited data from Safari users. This flaw highlights the importance of strict origin isolation in browser security to prevent cross-origin data leaks.
Potential Impact
The primary impact of CVE-2026-28861 is a breach of confidentiality due to cross-origin data leakage via script message handlers in Safari. Attackers controlling malicious websites can potentially access messages or data intended for other origins, which may include sensitive user information or session details. Although the vulnerability does not affect data integrity or availability, unauthorized data exposure can facilitate further attacks such as phishing, social engineering, or targeted espionage. Organizations relying heavily on Apple devices and Safari for sensitive communications may face increased risk of information disclosure. The requirement for user interaction (visiting a malicious site) limits large-scale automated exploitation but does not eliminate risk, especially in environments where users frequently browse untrusted websites. The absence of known exploits in the wild reduces immediate threat but patching is critical to prevent future exploitation. Overall, the vulnerability could undermine user trust and confidentiality in affected Apple platforms.
Mitigation Recommendations
To mitigate CVE-2026-28861, organizations and users should promptly update Safari and their Apple operating systems to versions 26.4 (Safari) and 18.7.7 (iOS/iPadOS), or later, where the fix is implemented. Beyond patching, organizations should enforce strict web browsing policies that restrict access to untrusted or unknown websites, reducing exposure to malicious content. Deploying network-level web filtering and DNS filtering can help block known malicious domains that might exploit this vulnerability. Security teams should monitor for suspicious web traffic patterns indicative of cross-origin attacks and educate users about the risks of visiting untrusted websites. For high-security environments, consider using browser isolation technologies or alternative browsers with robust origin isolation until patches are applied. Regular vulnerability scanning and penetration testing should include checks for this and similar browser-origin isolation issues. Finally, maintain an incident response plan to quickly address any suspected data leakage incidents stemming from browser vulnerabilities.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Singapore, Sweden, Netherlands
CVE-2026-28861: A malicious website may be able to access script message handlers intended for other origins in Apple Safari
Description
A logic issue was addressed with improved state management. This issue is fixed in Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. A malicious website may be able to access script message handlers intended for other origins.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-28861 is a logic flaw in Apple Safari's handling of script message handlers, which are mechanisms used for communication between web content and native code. The vulnerability arises from improper state management that allows a malicious website to access script message handlers intended for other origins, violating the same-origin policy. This can lead to unauthorized access to data or messages that should be isolated per origin, potentially leaking sensitive information. The issue affects Safari versions prior to 26.4 on macOS Tahoe, iOS 18.7.7, iPadOS 18.7.7, visionOS 26.4, and related platforms. Exploitation requires a user to visit a crafted malicious website, but no authentication or elevated privileges are needed. Apple fixed the vulnerability by improving the internal state management of script message handlers, ensuring proper origin separation. The CVSS v3.1 score is 4.3 (medium), reflecting the limited confidentiality impact and the requirement for user interaction. No known exploits have been reported in the wild, but the vulnerability could be leveraged in targeted attacks to extract limited data from Safari users. This flaw highlights the importance of strict origin isolation in browser security to prevent cross-origin data leaks.
Potential Impact
The primary impact of CVE-2026-28861 is a breach of confidentiality due to cross-origin data leakage via script message handlers in Safari. Attackers controlling malicious websites can potentially access messages or data intended for other origins, which may include sensitive user information or session details. Although the vulnerability does not affect data integrity or availability, unauthorized data exposure can facilitate further attacks such as phishing, social engineering, or targeted espionage. Organizations relying heavily on Apple devices and Safari for sensitive communications may face increased risk of information disclosure. The requirement for user interaction (visiting a malicious site) limits large-scale automated exploitation but does not eliminate risk, especially in environments where users frequently browse untrusted websites. The absence of known exploits in the wild reduces immediate threat but patching is critical to prevent future exploitation. Overall, the vulnerability could undermine user trust and confidentiality in affected Apple platforms.
Mitigation Recommendations
To mitigate CVE-2026-28861, organizations and users should promptly update Safari and their Apple operating systems to versions 26.4 (Safari) and 18.7.7 (iOS/iPadOS), or later, where the fix is implemented. Beyond patching, organizations should enforce strict web browsing policies that restrict access to untrusted or unknown websites, reducing exposure to malicious content. Deploying network-level web filtering and DNS filtering can help block known malicious domains that might exploit this vulnerability. Security teams should monitor for suspicious web traffic patterns indicative of cross-origin attacks and educate users about the risks of visiting untrusted websites. For high-security environments, consider using browser isolation technologies or alternative browsers with robust origin isolation until patches are applied. Regular vulnerability scanning and penetration testing should include checks for this and similar browser-origin isolation issues. Finally, maintain an incident response plan to quickly address any suspected data leakage incidents stemming from browser vulnerabilities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apple
- Date Reserved
- 2026-03-03T16:36:03.972Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69c333dff4197a8e3baaeb4f
Added to database: 3/25/2026, 1:01:19 AM
Last enriched: 4/3/2026, 3:12:15 AM
Last updated: 4/28/2026, 7:24:58 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.