CVE-2026-20643
Apple Navigation API Cross-Origin Policy Bypass
Description
A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS, iPadOS, and macOS, Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. Processing maliciously crafted web content may bypass Same Origin Policy.
INFO
Published Date :
March 17, 2026, 11:16 p.m.
Last Modified :
March 25, 2026, 1:17 a.m.
Remotely Exploit :
Yes !
Source :
[email protected]
Affected Products
The following products are affected by CVE-2026-20643
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | 134c704f-9b21-4f2e-91b3-4a467353bcc0 |
Solution
- Update iOS to version 26.3.1 or later.
- Update iPadOS to version 26.3.1 or later.
- Update macOS to version 26.3.1 or 26.3.2 or later.
Public PoC/Exploit Available at Github
CVE-2026-20643 has a 4 public
PoC/Exploit available at Github.
Go to the Public Exploits tab to see the list.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2026-20643.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2026-20643 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2026-20643
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
CVE-2026-20643 test page
HTML JavaScript
None
HTML
WebKit NavigateEvent.canIntercept SOP bypass via cross-port interception — iOS 26.3.1 BSI (CVE-2026-20643)
HTML
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
security cve exploit poc vulnerability
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-20643 vulnerability anywhere in the article.
-
CybersecurityNews
Apple Expands iOS 18.7.7 Update to More Devices to Shield Users from DarkSword Exploit
Apple has taken the rare step of expanding the availability of iOS 18.7.7 and iPadOS 18.7.7 to a broader set of devices on April 1, 2026, pushing critical backported security patches to millions of us ... Read more
-
The Hacker News
⚡ Weekly Recap: CI/CD Backdoor, FBI Buys Location Data, WhatsApp Ditches Numbers & More
Another week, another reminder that the internet is still a mess. Systems people thought were secure are being broken in simple ways, showing many still ignore basic advisories. This edition covers a ... Read more
-
Daily CyberSecurity
Unmasking DarkSword: GTIG Exposes Full-Chain iOS Exploit Used by Global Spies
Timeline of DarkSword observations and vulnerability patches | Image: GTIG In a comprehensive technical disclosure, the Google Threat Intelligence Group (GTIG) has revealed the existence of a highly s ... Read more
-
Daily CyberSecurity
PoC Exploit Publicly Disclosed: Apple Deploys First-Ever Background Security Patch for Cross-Origin Flaw
Apple has broken new ground in its defensive strategy, utilizing a “Background Security Improvements” feature to deliver an out-of-band fix for a significant cross-origin vulnerability. The flaw, trac ... Read more
-
The Cyber Express
Android Malware Campaign Targets Indian Users via Fake eChallan Alerts
A new Android malware campaign targeting Indian users has been reported by the Indian Computer Emergency Response Team, CERT-In. According to the agency, multiple reports indicate a coordinated effort ... Read more
-
The Cyber Express
Pixel Watch Users Report Inflated Steps, Missing SpO2 Data
A recent Pixel firmware update released in March 2026 has sparked concern among Pixel Watch users, as reports of inaccurate Fitbit tracking, missing SpO2 readings, and inflated activity data continue ... Read more
-
The Cyber Express
Interlock Ransomware Leveraged Cisco FMC Zero-Day 36 Days Before Patch
Amazon’s threat intelligence teams have uncovered a new cyber campaign linked to the Interlock ransomware group. The campaign centers around a flaw affecting Cisco Secure Firewall Management Center (F ... Read more
-
The Cyber Express
Apple Patches WebKit Vulnerability CVE-2026-20643 Across iOS, macOS
Apple has released a new security update to address a critical WebKit vulnerability tracked as CVE-2026-20643. The vulnerability was identified as a cross-origin issue within the Navigation API of Web ... Read more
-
CybersecurityNews
Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS
Apple WebKit Vulnerability Enables Malicious Web Content Bypass on iOS and macOS Apple has released critical security patches to address a high-severity WebKit vulnerability that allows maliciously cr ... Read more
-
Help Net Security
Apple starts issuing lightweight security updates between software releases
Apple is delivering small security updates, called Background Security Improvements, starting with iOS 26.1, iPadOS 26.1, and macOS 26.1. Apple describes Background Security Improvements as lightweigh ... Read more
-
security.nl
Apple rolt eerste 'background security improvement' uit wegens WebKit-lek
Apple heeft wegens een WebKit-lek voor het eerst een 'background security improvement' uitgerold voor iOS, iPadOS en macOS. Background security improvements worden uitgebracht tussen de normale softwa ... Read more
-
The Hacker News
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS
Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CV ... Read more
The following table lists the changes that have been made to the
CVE-2026-20643 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Modified by [email protected]
Mar. 25, 2026
Action Type Old Value New Value Changed Description A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Processing maliciously crafted web content may bypass Same Origin Policy. A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS, iPadOS, and macOS, Safari 26.4, iOS 18.7.7 and iPadOS 18.7.7, iOS 26.4 and iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4. Processing maliciously crafted web content may bypass Same Origin Policy. Added Reference https://support.apple.com/en-us/126792 Added Reference https://support.apple.com/en-us/126793 Added Reference https://support.apple.com/en-us/126794 Added Reference https://support.apple.com/en-us/126799 Added Reference https://support.apple.com/en-us/126800 -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Mar. 19, 2026
Action Type Old Value New Value Added Reference http://seclists.org/fulldisclosure/2026/Mar/10 -
Initial Analysis by [email protected]
Mar. 18, 2026
Action Type Old Value New Value Added CPE Configuration OR *cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* versions up to (excluding) 26.3.1 *cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* versions up to (excluding) 26.3.1 *cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* versions up to (excluding) 26.3.1 Added Reference Type Apple Inc.: https://support.apple.com/en-us/126604 Types: Release Notes, Vendor Advisory -
CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0
Mar. 18, 2026
Action Type Old Value New Value Added CVSS V3.1 AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Added CWE CWE-20 Added CWE CWE-346 -
New CVE Received by [email protected]
Mar. 17, 2026
Action Type Old Value New Value Added Description A cross-origin issue in the Navigation API was addressed with improved input validation. This issue is fixed in Background Security Improvements for iOS 26.3.1, iPadOS 26.3.1, macOS 26.3.1, and macOS 26.3.2. Processing maliciously crafted web content may bypass Same Origin Policy. Added Reference https://support.apple.com/en-us/126604