Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20251217032034.GD672965@igalia.com>
Date: Wed, 17 Dec 2025 03:20:34 +0200
From: Adrian Perez de Castro <aperez@...lia.com>
To: webkit-gtk@...ts.webkit.org, webkit-wpe@...ts.webkit.org
Cc: security@...kit.org, oss-security@...ts.openwall.com
Subject: WebKitGTK and WPE WebKit Security Advisory WSA-2025-0010

------------------------------------------------------------------------
WebKitGTK and WPE WebKit Security Advisory                 WSA-2025-0010
------------------------------------------------------------------------

Date reported           : December 17, 2025
Advisory ID             : WSA-2025-0010
WebKitGTK Advisory URL  : https://webkitgtk.org/security/WSA-2025-0010.html
WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2025-0010.html
CVE identifiers         : CVE-2025-14174, CVE-2025-43501,
                          CVE-2025-43529, CVE-2025-43531,
                          CVE-2025-43535, CVE-2025-43536,
                          CVE-2025-43541.

Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.

CVE-2025-14174
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Apple and Google Threat Analysis Group.
    Impact: Processing maliciously crafted web content may lead to
    memory corruption. Apple is aware of a report that this issue may
    have been exploited in an extremely sophisticated attack against
    specific targeted individuals on versions of iOS before iOS 26.
    CVE-2025-43529 was also issued in response to this report.
    Description: A memory corruption issue was addressed with improved
    validation.
    WebKit Bugzilla: 303614

CVE-2025-43501
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: A buffer overflow issue was
    addressed with improved memory handling.
    WebKit Bugzilla: 301371

CVE-2025-43529
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Google Threat Analysis Group.
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution. Apple is aware of a report that this issue
    may have been exploited in an extremely sophisticated attack against
    specific targeted individuals on versions of iOS before iOS 26.
    CVE-2025-14174 was also issued in response to this report.
    Description: A use-after-free issue was addressed with improved
    memory management.
    WebKit Bugzilla: 302502

CVE-2025-43531
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Phil Pizlo of Epic Games.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: A race condition was
    addressed with improved state handling.
    WebKit Bugzilla: 301940

CVE-2025-43535
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Google Big Sleep, Nan Wang (@eternalsakura13).
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: The issue was addressed with
    improved memory handling.
    WebKit Bugzilla: 301338

CVE-2025-43536
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Nan Wang (@eternalsakura13).
    Impact: Processing maliciously crafted web content may lead to an
    unexpected process crash. Description: A use-after-free issue was
    addressed with improved memory management.
    WebKit Bugzilla: 301726

CVE-2025-43541
    Versions affected: WebKitGTK and WPE WebKit before 2.50.4.
    Credit to Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative.
    Impact: Processing maliciously crafted web content may lead to an
    unexpected Safari crash. Description: A type confusion issue was
    addressed with improved state handling.
    WebKit Bugzilla: 301257

We recommend updating to the latest stable versions of WebKitGTK and WPE
WebKit. It is the best way to ensure that you are running safe versions
of WebKit. Please check our websites for information about the latest
stable releases.

Further information about WebKitGTK and WPE WebKit security advisories
can be found at: https://webkitgtk.org/security.html or
https://wpewebkit.org/security.

The WebKitGTK and WPE WebKit team,

Download attachment "signature.asc" of type "application/pgp-signature" (196 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.