Apple patches WebKit flaw that could bypass same-origin protections on iPhone, iPad, and Mac

March 22, 20262 min read2 sources
Share:
Apple patches WebKit flaw that could bypass same-origin protections on iPhone, iPad, and Mac

Apple has released a Background Security Improvements update to fix a WebKit vulnerability that could let malicious web content bypass the browser’s same-origin policy on iOS, iPadOS, and macOS.

The flaw, tracked as CVE-2026-20643, is described as a cross-origin issue in WebKit’s Navigation API. According to reporting from The Hacker News, the bug could be exploited with specially crafted web content, potentially allowing unauthorized access across website boundaries. Apple did not list a CVSS score, which is common in its security advisories.

The same-origin policy is one of the web’s core security controls. It is designed to stop a page from one site from reading or interfering with data from another. A bypass in that boundary can create opportunities for attackers to access sensitive session data, expose content from authenticated sites, or chain the bug with other browser flaws for broader compromise.

The fix matters beyond Safari. WebKit underpins Apple’s browser engine across the platform, including many in-app browsers and embedded web views. That gives the issue a wider reach across consumer and enterprise devices, especially where users access email, SSO portals, and internal web apps from the same device.

Apple has increasingly used smaller, faster security delivery mechanisms, including Background Security Improvements, to push targeted fixes without waiting for larger OS updates. For defenders, that shortens patch windows on high-risk browser bugs, but it also means organizations need visibility into how quickly managed devices receive these updates.

Apple has not publicly disclosed whether CVE-2026-20643 was exploited in the wild. Users and administrators should ensure affected devices are updated and review browser and web-view exposure where untrusted content is routinely opened. For users handling sensitive traffic on public networks, using a VPN can reduce some interception risks, though it does not mitigate browser-engine flaws.

Share:

// SOURCES

// RELATED

Three Microsoft Defender zero-days actively exploited; two still unpatched

Security firm Huntress warns of active exploitation of three Microsoft Defender zero-days, codenamed BlueHammer, RedSun, and UnDefend. Two remain unpa

6 min readApr 18

London healthcare faces months of disruption after ransomware attack on key supplier

A major ransomware attack on pathology provider Synnovis has caused severe, ongoing disruption to London hospitals, highlighting critical supply chain

6 min readApr 18

Most 'AI SOCs' are just faster triage, and that's not enough

Many AI security tools only speed up alert analysis, failing to reduce analyst workload. Experts argue real gains require AI that automates response a

2 min readApr 17

ZionSiphon malware designed to sabotage water treatment systems

A new proof-of-concept malware, ZionSiphon, demonstrates how attackers can sabotage water treatment plants by manipulating industrial control systems.

2 min readApr 17