Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Qilin Ransomware Lists RDP Auth History on Enumerates Authentication
April 30, 2026
Phoenix PhaaS Fuels Brand Smishing in Finance Platform Drives
April 30, 2026
Targeted Large-Scale Campaign Attacking U.S. Organizations with
April 30, 2026
Home/CyberSecurity News/Apple WebKit Flaw Allows Malicious Web Vulnerability Enables
CyberSecurity News

Apple WebKit Flaw Allows Malicious Web Vulnerability Enables

Apple has released critical security patches. These updates target a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy. Released on March...

David kimber
David kimber
March 18, 2026 2 Min Read
0 0

Apple has released critical security patches. These updates target a high-severity WebKit vulnerability that allows maliciously crafted web content to bypass the Same Origin Policy.

Released on March 17, 2026, these updates apply to the latest versions of Apple’s mobile and desktop operating systems.

The patch is delivered through the Background Security Improvements mechanism, ensuring devices receive rapid protection without requiring a lengthy system reboot or a major software update installation.

Apple WebKit Vulnerability CVE-2026-20643

Discovered and reported by security researcher Thomas Espach, the vulnerability is officially tracked as CVE-2026-20643. The flaw originates from a cross-origin issue within the Navigation API of the WebKit framework stack.

Under normal circumstances, the Same Origin Policy acts as a fundamental security boundary in modern web browsers. It restricts how a document or script loaded by one origin can interact with resources from another origin.

When threat actors successfully bypass this mechanism using maliciously crafted web content. They can potentially steal authentication tokens, hijack user sessions, or exfiltrate private information from trusted websites the victim is currently visiting.

Apple engineers addressed the underlying Navigation API weakness by implementing improved input validation, successfully closing the loophole that allowed improper cross-origin navigation.

Rather than waiting for the next major software release, Apple distributed this fix as a Background Security Improvement.

Introduced with the 26.1 operating system versions, these lightweight updates deliver crucial security protections for components like the Safari browser, the WebKit framework stack, and various system libraries.

This rapid-response system allows Apple to patch highly severe vulnerabilities seamlessly between standard update cycles.

If a user experiences rare compatibility issues after a patch is applied, they can temporarily remove the improvement.

Doing so reverts the device to the baseline software update until the patch is formally enhanced and integrated into a subsequent major release.

The rapid updates apply specifically to iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. To ensure devices remain protected against this WebKit vulnerability, users should verify that their settings are configured to accept ongoing patches automatically.

Users can manage these configurations by navigating to the Privacy & Security menu in their device settings.

On iPhones and iPads, this is located directly in the main Settings app. At the same time, Mac users can access it through System Settings via the Apple menu.

From there, selecting the Background Security Improvements option allows users to confirm that the “Automatically Install” feature is turned on.

Turning off this setting leaves devices vulnerable to cross-origin attacks until a standard software update is manually installed.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEPatchSecurityThreatVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Critical Telnetd Flaw Allows Remote Code Execution via

Next Post

UIDAI Launches Bug Bounty to Strengthen Aadhaar Security

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Google Gemini CLI Flaws Allow Remote Code Execution on Hosts
April 30, 2026
Jenkins Fixes High-Severity Plugin Flaws: Patches Including
April 30, 2026
WordPress Plugin Hacked Since 2020 to Inject Malicious
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us