Apple patches WebKit flaw that could bypass same-origin protections on iPhone, iPad, and Mac

March 22, 20262 min read2 sources
Share:
Apple patches WebKit flaw that could bypass same-origin protections on iPhone, iPad, and Mac

Apple has released a Background Security Improvements update to fix a WebKit vulnerability that could let malicious web content bypass the browser’s same-origin policy on iOS, iPadOS, and macOS.

The flaw, tracked as CVE-2026-20643, is described as a cross-origin issue in WebKit’s Navigation API. According to reporting from The Hacker News, the bug could be exploited with specially crafted web content, potentially allowing unauthorized access across website boundaries. Apple did not list a CVSS score, which is common in its security advisories.

The same-origin policy is one of the web’s core security controls. It is designed to stop a page from one site from reading or interfering with data from another. A bypass in that boundary can create opportunities for attackers to access sensitive session data, expose content from authenticated sites, or chain the bug with other browser flaws for broader compromise.

The fix matters beyond Safari. WebKit underpins Apple’s browser engine across the platform, including many in-app browsers and embedded web views. That gives the issue a wider reach across consumer and enterprise devices, especially where users access email, SSO portals, and internal web apps from the same device.

Apple has increasingly used smaller, faster security delivery mechanisms, including Background Security Improvements, to push targeted fixes without waiting for larger OS updates. For defenders, that shortens patch windows on high-risk browser bugs, but it also means organizations need visibility into how quickly managed devices receive these updates.

Apple has not publicly disclosed whether CVE-2026-20643 was exploited in the wild. Users and administrators should ensure affected devices are updated and review browser and web-view exposure where untrusted content is routinely opened. For users handling sensitive traffic on public networks, using a VPN can reduce some interception risks, though it does not mitigate browser-engine flaws.

Share:

// SOURCES

// RELATED

Enterprise cybersecurity software fails 20% of the time, warns Absolute Security

A new report finds 20% of enterprise security tools are failing due to poor patch management and IT complexity, leaving organizations dangerously expo

6 min readApr 1

The FCC's router ban: A necessary security measure or the wrong fix?

The FCC put foreign-made consumer routers on its prohibited list to protect national security, but critics argue the ban creates a false sense of secu

6 min readApr 1

Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper

A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber

6 min readApr 1

We found eight attack vectors inside AWS Bedrock. Here's what attackers can do with them

Security researchers have uncovered eight critical attack vectors in AWS Bedrock, Amazon's AI platform, revealing how its deep enterprise integration

7 min readApr 1