On March 18, 2026, Apple released a silent background security update to address CVE-2026-20643, a cross-origin vulnerability in its WebKit web rendering engine. WebKit is the technology that powers Safari, Mail, and the App Store across all Apple operating systems. The vulnerability could allow a specially crafted malicious website to bypass the Same-Origin Policy (SOP), a critical security control that prevents websites from interacting with each other. Successful exploitation could lead to the theft of sensitive data, such as session cookies or personal information, from other websites open in a user's browser. The patch was delivered automatically and there is no indication the flaw was exploited in the wild.
The Same-Origin Policy is a cornerstone of web security. It ensures that a script running on evil.com cannot read data from a user's session on mybank.com. A vulnerability that bypasses this policy is significant because it breaks this fundamental trust model. An attacker could host a malicious page that, when visited, could read the content of other browser tabs or embedded frames, potentially stealing authentication tokens, session cookies, or sensitive data displayed on the page.
The vulnerability affects WebKit on multiple Apple platforms. The background patch was rolled out to devices running the latest OS versions, including:
According to Apple and security researchers, there is no evidence that CVE-2026-20643 has been actively exploited in the wild. The patch was released proactively to prevent potential future abuse.
To exploit this vulnerability, an attacker would first need to convince a user to visit a malicious website (T1566 - Phishing). If a user visited the site while also being logged into other services (like webmail, social media, or online banking) in other tabs, the malicious script could potentially access and exfiltrate data from those sessions. This could lead to account takeover, financial theft, or the compromise of private conversations. While the exploit requires user interaction, the potential for data theft from trusted sites makes it a serious flaw.
As this is a client-side vulnerability exploited within the browser, detection on the network or host is very difficult. The primary method of defense is prevention through patching.
Settings > General > Software Update on iOS/iPadOS and System Settings > General > Software Update on macOS to ensure they are running the latest protected version.Ensure automatic updates are enabled on all Apple devices to receive background security patches promptly.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats