Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

New Vulnerability Revealed: Apple Fixes WebKit Flaw to Bypass Same-Origin Policy on iOS and macOS


Apple has recently released a critical patch for its WebKit vulnerability, allowing users to avoid potential security breaches by keeping their operating systems updated. The newly discovered flaw highlights the importance of continued security patches and regular software updates.

  • Apple has released a security patch for the WebKit vulnerability CVE-2026-20643, which allows malicious sites to hijack local OpenClaw AI agents via WebSocket.
  • The vulnerability is related to the Navigation API in WebKit and can be exploited by attackers to bypass the same-origin policy when processing maliciously crafted web content.
  • A new Background Security Improvements feature will enable security improvements starting with iOS 26.1, iPadOS 26.1, and macOS 26.
  • Users who disable this feature must wait for the next software update, which could potentially introduce security patches.
  • The latest updates also address four additional security vulnerabilities targeted as part of the Coruna exploit kit.
  • The zero-day vulnerability has a CVSS score of 7.8, signifying it as an extremely severe flaw that can lead to arbitrary code execution.
  • Users are advised to regularly check for software updates and be cautious about clicking on unknown links or downloading suspicious attachments.
  • Apple's release demonstrates its commitment to addressing emerging security vulnerabilities promptly and ensuring user device protection.



  • Apple has recently released a security patch for its WebKit vulnerability, CVE-2026-20643, which allows malicious sites to hijack local OpenClaw AI agents via WebSocket. This newly discovered flaw is considered a zero-day vulnerability, meaning it was unknown to the general public before Apple's recent update.

    The vulnerability is related to the Navigation API in WebKit and could be exploited by attackers to bypass the same-origin policy when processing maliciously crafted web content. The WebKit framework stack is a critical component of Safari, and its vulnerability can lead to potential security breaches.


    According to Thomas Espach, the security researcher who discovered this flaw, it has been found that the newly introduced Background Security Improvements feature will enable these improvements starting with iOS 26.1, iPadOS 26.1, and macOS 26. It supports automatic installation through a setting within the Privacy and Security menu of the Settings app.

    The developers have noted that if users opt to disable this feature, they must wait for the next software update, which could potentially introduce security patches.


    Furthermore, Apple has recently expanded their patch releases to address four additional security vulnerabilities that were targeted as part of the Coruna exploit kit. These exploits targeted iOS 13-17.2.1 and contained four separate vulnerabilities - CVE-2023-43010, CVE-2023-43000, CVE-2023-41974, and CVE-2024-23222.


    The latest updates follow several other recent patches for actively exploited zero-day issues in the iOS, iPadOS, macOS Tahoe, tvOS, watchOS, and visionOS operating systems. The zero-day vulnerability (CVE-2026-20700) has a CVSS score of 7.8, which signifies it as an extremely severe flaw that can lead to arbitrary code execution.


    The newly discovered vulnerability in WebKit highlights the importance of continued security patch releases for mobile devices. These updates ensure the safety and security of users' data and prevent malicious attacks on their systems.


    In light of this new discovery, users are advised to regularly check for software updates from reputable sources to keep their operating systems and applications secure. Moreover, they should also be cautious about clicking on unknown links or downloading suspicious attachments to minimize the risk of falling prey to these types of threats.


    In addition, Apple's recent release demonstrates its commitment to addressing emerging security vulnerabilities promptly, ensuring that users' devices remain protected against newly discovered exploits.


    The discovery of this vulnerability serves as a reminder for software developers and security professionals alike to stay vigilant in monitoring and identifying potential security risks within their applications and systems.


    By staying up-to-date with the latest patches and updates, individuals can significantly reduce the risk of falling victim to these emerging threats and ensure that their devices remain secure against malicious attacks.


    Apple has recently released a critical patch for its WebKit vulnerability, allowing users to avoid potential security breaches by keeping their operating systems updated. The newly discovered flaw highlights the importance of continued security patches and regular software updates.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/New-Vulnerability-Revealed-Apple-Fixes-WebKit-Flaw-to-Bypass-Same-Origin-Policy-on-iOS-and-macOS-ehn.shtml

  • https://thehackernews.com/2026/03/apple-fixes-webkit-vulnerability.html

  • https://www.rescana.com/post/apple-urgent-security-update-cve-2025-14174-webkit-same-origin-policy-bypass-vulnerability-impacts

  • https://nvd.nist.gov/vuln/detail/CVE-2026-20643

  • https://www.cvedetails.com/cve/CVE-2026-20643/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-43010

  • https://www.cvedetails.com/cve/CVE-2023-43010/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-43000

  • https://www.cvedetails.com/cve/CVE-2023-43000/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-41974

  • https://www.cvedetails.com/cve/CVE-2023-41974/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-23222

  • https://www.cvedetails.com/cve/CVE-2024-23222/

  • https://nvd.nist.gov/vuln/detail/CVE-2026-20700

  • https://www.cvedetails.com/cve/CVE-2026-20700/


  • Published: Wed Mar 18 03:32:04 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us