Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

Foto: The Hacker News
Apple released a security patch for WebKit that eliminates a vulnerability allowing same-origin policy bypass on iOS and macOS devices. The flaw allowed attackers to access data from other domains without authorization, posing a serious threat to user privacy. Same-origin policy is a fundamental protection mechanism for web browsers — it blocks scripts from one website from accessing data from another. Bypassing it could lead to theft of login information, financial data, or sensitive messages stored in web applications. The update is available to all Apple users — on iPhones, iPads, and Mac computers. The manufacturer recommends immediate installation of the patch, particularly for users utilizing online banking, email, or applications storing personal data. The incident underscores the importance of Zero Trust Network Access — an approach in which every access request is verified independently, regardless of origin. Such solutions minimize the risk of lateral movement in networks and provide an alternative to traditional VPNs.
Apple has just closed one of potentially the most dangerous security vulnerabilities in WebKit — the rendering engine for web pages on iOS, iPadOS and macOS. The vulnerability CVE-2026-20643 allowed circumvention of a fundamental browser security principle, namely the same-origin policy, meaning attackers could potentially gain access to data from other domains without user knowledge. This is not an ordinary vulnerability — it is an attack on the very architecture of web security that we have known for decades. The fact that Apple released a patch as part of its first Background Security Improvements this year testifies to the seriousness of the situation and the required speed of response.
For millions of Apple users worldwide — and especially those dealing with sensitive data, whether in business or private life — this news should be a signal to immediately update their devices. But beyond the mere fact of the fix, this story reveals much deeper problems related to the security of modern digital infrastructure, access security, and the need to move from traditional protection models to more advanced solutions.
Anatomy of the Navigation API vulnerability — how the same-origin policy was bypassed
Same-origin policy is one of the pillars of web browser security. This principle states that a script loaded from one domain should not have access to data from another domain — unless that other domain explicitly allows it through mechanisms such as CORS (Cross-Origin Resource Sharing). This solution protects users from malicious sites stealing their login credentials from banks, social media or email.
Read also
The WebKit vulnerability concerning Navigation API represented a serious deviation from this rule. Navigation API is a relatively new application programming interface (API) in the web standard that allows developers more advanced control over navigation in single-page applications (SPA). Instead of traditional page reloading, Navigation API enables smooth transitions between views without losing application state. The problem was that WebKit did not properly validate the origin of navigation requests — attackers could use this to redirect users to a resource from a different domain and then gain access to data they would not normally have access to.
The attack scenario would look as follows: a user visits a malicious site containing specially crafted JavaScript code. This code uses Navigation API to perform a navigation operation that appears to come from another, trusted domain. WebKit, due to the vulnerability, does not properly verify whether this navigation is actually authorized. As a result, the attacker gains access to data that should be protected. This is particularly dangerous in the context of web applications storing sensitive information — from financial data to medical information.
Why WebKit remains a battleground for cybercriminals
WebKit is the web rendering engine used by Safari on iOS, iPadOS and macOS. While Apple maintains that WebKit is secure and updates it regularly, the reality is more complicated. WebKit is a central point for the entire Apple ecosystem — every application on iOS that displays web content must use WebKit. This means that a vulnerability in WebKit potentially affects hundreds of millions of devices worldwide.
History shows that WebKit regularly falls victim to advanced attacks. Security researchers from projects such as Google Project Zero consistently discover new vulnerabilities in WebKit that can be exploited for remote code execution. The fact that CVE-2026-20643 concerns Navigation API — a relatively new component — suggests that Apple may not have fully analyzed all security implications when implementing new web features. This is a typical problem in the rapidly evolving web ecosystem: innovation often outpaces security.
For Polish users who increasingly rely on web applications to manage their bank accounts, access healthcare systems or conduct business communications, this vulnerability posed a real threat. Polish financial institutions and government offices increasingly move their services to browsers, meaning vulnerabilities like CVE-2026-20643 have a direct impact on the security of citizens' data.
Background Security Improvements — Apple changes its strategy for communicating vulnerabilities
Apple released the fix for CVE-2026-20643 as part of its Background Security Improvements — a new company initiative regarding security. This change in communication is worth noting. Traditionally, Apple released security patches along with regular operating system updates, often accompanied by dramatic descriptions of the threat. Now the company is changing its approach, releasing patches outside the regular update cycle and with a less dramatic tone.
On one hand, this makes sense — it allows Apple to respond more quickly to threats without waiting for the next iOS or macOS release cycle. On the other hand, this strategy may lead to users missing critical security updates. Research shows that a significant portion of Apple users do not update their devices immediately after a patch is released — many wait weeks or months. In the context of serious vulnerabilities like CVE-2026-20643, every day of delay increases the window of opportunity for potential attacks.
Apple's communication regarding Background Security Improvements is also interesting because of the lack of details. The company did not disclose whether the vulnerability was already exploited in field attacks or whether publicly available exploits exist. This caution is understandable — Apple does not want to worsen the situation by drawing cybercriminals' attention to the vulnerability — but for security specialists it means making decisions based on incomplete information.
From same-origin policy to zero-trust — a shift in security paradigm
The CVE-2026-20643 vulnerability illustrates a fundamental problem with the traditional approach to web security — relying on same-origin policy as the primary protection mechanism. While same-origin policy is better than nothing, it is not sufficient in today's complex threat landscape. Attackers constantly find new ways to bypass this principle, whether through implementation vulnerabilities or by manipulating application logic.
A modern approach to security, known as zero-trust architecture, assumes that no request should be trusted by default — regardless of its origin. In the zero-trust model, every request must be verified, every user must be authenticated, and all communications should be encrypted. This approach is particularly important for organizations that want to protect sensitive data from advanced threats.
For companies involved in IT infrastructure security, the CVE-2026-20643 vulnerability is another argument for moving from traditional perimeter-based security models (firewall, VPN) to more advanced solutions. Instead of relying on all network traffic passing through a VPN being secure, organizations should implement identity and context-based access controls. This means that even if an attacker bypasses the same-origin policy, they will not be able to access sensitive resources without proper permissions and multi-factor authentication.
Practical implications for Polish users and businesses
For the average Apple user in Poland, the simplest advice is: immediately update your device to the latest version of iOS, iPadOS or macOS. Do not wait for the next release cycle — download the Background Security Improvements now. The vulnerability in Navigation API is serious enough to justify immediate action. If you use an iPhone to access your bank account, email or business communications, the risk is particularly high.
For companies involved in IT security management, the CVE-2026-20643 vulnerability should be a signal to review security policies for web application access. Many Polish companies still rely on traditional VPN solutions to secure employee access to corporate resources. However, in the era of hybrid work and distributed access to applications, this approach is increasingly insufficient. Instead, organizations should consider implementing Zero Trust Network Access (ZTNA) solutions, which provide application access based on identity rather than network.
ZTNA solutions offer several key benefits in the context of threats like CVE-2026-20643:
- Microsegmentation — each application is isolated, so even if an attacker bypasses one security layer, they will not automatically have access to other resources
- Identity-based authentication — each user must be authenticated before gaining access to an application, regardless of whether the request comes from inside or outside the corporate network
- Context-based access control — the system can consider factors such as user location, device type, time of day and activity history when making access decisions
- Monitoring and logging — every access request is recorded and analyzed, enabling quick detection of suspicious activity
Industry perspective — can WebKit be replaced
One of the more controversial aspects of WebKit security on iOS is the fact that Apple forces all applications to use WebKit to display web content. Competitors such as Google with Chrome allow the use of alternative rendering engines. Theoretically, forcing users to a single engine could be seen as a security threat — if WebKit has a vulnerability, everyone is exposed. On the other hand, Apple argues that this approach enables them to manage security more consistently and deploy patches more quickly.
The reality is more complex. While Apple can indeed deploy WebKit security patches quickly, implementation of new web standards is often slow. Web application developers complain that Safari and WebKit lag behind Chrome and Firefox in supporting new APIs and standards. This means that web applications on iOS often have limited functionality compared to versions on Android or desktop computers.
For the Polish technology ecosystem, this situation has practical implications. Polish companies involved in web application development must often implement workarounds and compromises to ensure a decent user experience on iOS. Security vulnerabilities like CVE-2026-20643 further complicate this situation — developers must be aware not only of WebKit's functional limitations but also of its security vulnerabilities.
The future of web security — will Navigation API be secure
Navigation API is a relatively new addition to the web standard, and like any new technology, it has many shortcomings. The CVE-2026-20643 vulnerability will not be the last vulnerability related to Navigation API — this is almost certain. Given the history of web API security, we can expect further discoveries in the coming months and years.
For standards organizations such as the W3C, which develop web specifications, this situation is a challenge. They must balance between adding new features that developers want and ensuring that these features are secure. Often this balance is difficult to achieve — features are released with security gaps that are then fixed through browser updates.
For users and businesses, this means that web security cannot be treated as something that has been "solved" — it is an ongoing process. Regular updates, user education and implementation of advanced security strategies such as zero-trust are not options but necessary elements of a modern approach to cybersecurity. The CVE-2026-20643 vulnerability is further proof that in a digital world that constantly changes and evolves, the only way to be secure is to be vigilant and proactive.
More from Security

Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

LeakNet Ransomware Uses ClickFix via Hacked Sites, Deploys Deno In-Memory Loader

AI is Everywhere, But CISOs are Still Securing It with Yesterday's Skills and Tools, Study Finds
Related Articles

Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE
13h
Claude Code Security and Magecart: Getting the Threat Model Right
14h
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors
14h

