CVE-2026-20665 Overview
CVE-2026-20665 is a security protection mechanism bypass vulnerability affecting Apple's WebKit engine across multiple platforms. The vulnerability exists due to improper state management within the browser engine, allowing maliciously crafted web content to circumvent Content Security Policy (CSP) enforcement. CSP is a critical browser security mechanism designed to prevent cross-site scripting (XSS), clickjacking, and other code injection attacks by restricting the sources from which content can be loaded.
When exploited, this vulnerability enables attackers to bypass CSP restrictions that would normally prevent the execution of unauthorized scripts or loading of malicious resources. This could allow attackers to perform actions that CSP was specifically designed to block, including injection of malicious scripts into web pages viewed by users.
Critical Impact
Processing maliciously crafted web content may prevent Content Security Policy from being enforced, potentially exposing users to XSS attacks, data exfiltration, and other web-based threats that CSP normally mitigates.
Affected Products
- Apple Safari versions prior to 26.4
- Apple iOS and iPadOS versions prior to 18.7.7 and 26.4
- Apple macOS Tahoe versions prior to 26.4
- Apple tvOS versions prior to 26.4
- Apple visionOS versions prior to 26.4
- Apple watchOS versions prior to 26.4
Discovery Timeline
- 2026-03-25 - CVE-2026-20665 published to NVD
- 2026-03-25 - Last updated in NVD database
Technical Details for CVE-2026-20665
Vulnerability Analysis
This vulnerability is classified under CWE-693 (Protection Mechanism Failure), which describes a failure to properly use or implement security protection mechanisms. In this case, the WebKit rendering engine fails to maintain proper state when processing certain malicious web content, resulting in the Content Security Policy not being correctly enforced.
Content Security Policy operates by instructing the browser to only load and execute resources from trusted sources specified in policy headers. When state management fails during content processing, the browser may lose track of the active CSP rules, allowing scripts or resources that should be blocked to execute or load normally.
The network-accessible nature of this vulnerability means that any user visiting a maliciously crafted webpage could be affected. No authentication is required for exploitation, and the attack can be delivered through standard web browsing scenarios. This presents a significant risk across Apple's entire ecosystem of devices and operating systems that utilize WebKit.
Root Cause
The root cause of CVE-2026-20665 is improper state management within the WebKit rendering engine. State management issues occur when the application fails to properly track or maintain the state of security-relevant variables or conditions during content processing. In this case, the internal state that tracks whether CSP should be enforced becomes inconsistent when processing specifically crafted malicious content, leading to the security mechanism being bypassed.
Apple addressed this vulnerability through improved state management, ensuring that CSP enforcement state is properly maintained throughout the content processing lifecycle.
Attack Vector
The attack vector for CVE-2026-20665 is network-based, requiring the victim to access maliciously crafted web content. The attack scenario typically involves:
- An attacker crafts a malicious webpage containing specific content designed to trigger the state management flaw
- The victim navigates to the malicious page using an affected Apple browser or application
- The WebKit engine processes the malicious content, causing improper state transitions
- CSP enforcement fails, allowing previously blocked resources or scripts to execute
- The attacker can then perform actions such as XSS attacks, data theft, or session hijacking
The vulnerability requires no user interaction beyond visiting the malicious page, and no special privileges are needed for exploitation. The attack can be delivered through various means including malicious advertisements, compromised legitimate websites, or phishing links.
Detection Methods for CVE-2026-20665
Indicators of Compromise
- Unexpected script execution from domains not whitelisted in CSP headers
- Browser console warnings about CSP violations that do not prevent the actual violation
- Network traffic to unauthorized domains that should be blocked by CSP policies
- Anomalous resource loading patterns from third-party sources on trusted pages
Detection Strategies
- Monitor web proxy logs for requests to unexpected domains from pages with strict CSP policies
- Implement CSP reporting endpoints (report-uri or report-to directives) to detect CSP bypass attempts
- Deploy endpoint detection solutions that monitor WebKit process behavior for anomalous script execution
- Analyze browser-level telemetry for patterns consistent with CSP bypass exploitation
Monitoring Recommendations
- Enable CSP violation reporting to centralized logging infrastructure for anomaly detection
- Monitor affected Apple devices for outdated Safari and OS versions
- Implement network-level monitoring to detect connections to known malicious domains
- Review web application logs for unusual patterns that may indicate exploitation attempts
How to Mitigate CVE-2026-20665
Immediate Actions Required
- Update all Apple devices to the latest patched versions immediately
- Prioritize updates for devices used to access sensitive or high-value web applications
- Consider restricting web browsing on critical systems until patches are applied
- Enable automatic updates across all managed Apple devices
Patch Information
Apple has released security patches addressing CVE-2026-20665 across all affected platforms. The following versions contain the fix:
- Safari 26.4
- iOS 18.7.7 and iOS 26.4
- iPadOS 18.7.7 and iPadOS 26.4
- macOS Tahoe 26.4
- tvOS 26.4
- visionOS 26.4
- watchOS 26.4
For detailed patch information, refer to:
- Apple Support Document #126792
- Apple Support Document #126793
- Apple Support Document #126794
- Apple Support Document #126797
- Apple Support Document #126798
- Apple Support Document #126799
- Apple Support Document #126800
Workarounds
- Implement network-level web filtering to block access to known malicious domains
- Use browser extensions or proxies that provide additional CSP enforcement layers
- Limit browsing on unpatched devices to trusted internal applications only
- Consider using alternative browsers on critical systems until patches can be deployed
# Verify Safari version on macOS
/Applications/Safari.app/Contents/MacOS/Safari --version
# Check macOS version for patch status
sw_vers -productVersion
# Verify iOS/iPadOS version via MDM or Settings > General > About
# Target versions: iOS 18.7.7+, iOS 26.4+, iPadOS 18.7.7+, iPadOS 26.4+
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


