CVE-2021-30890
Rocky Linux vulnerability analysis and mitigation

Overview

CVE-2021-30890 is a logic vulnerability in Apple's operating systems that was disclosed and patched in October 2021. The vulnerability affects multiple Apple platforms including macOS Monterey 12.0.1, iOS 15.1, iPadOS 15.1, watchOS 8.1, and tvOS 15.1. When processing maliciously crafted web content, this vulnerability could lead to universal cross-site scripting (Apple Support, Apple Support).

Technical details

The vulnerability stems from a logic issue in the WebKit engine that was addressed with improved state management. It has been assigned a CVSS v3.1 base score of 6.1 (Medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating that it is network-exploitable, requires low attack complexity, needs no privileges, but does require user interaction (NVD).

Impact

When successfully exploited, this vulnerability allows processing of maliciously crafted web content that may lead to universal cross-site scripting. This could potentially allow attackers to execute arbitrary scripts in the context of any website, potentially leading to theft of sensitive information or session hijacking (WebKit Security Advisory).

Mitigation and workarounds

Apple has released security updates to address this vulnerability across multiple platforms: macOS Monterey 12.0.1, iOS 15.1, iPadOS 15.1, watchOS 8.1, and tvOS 15.1. Users are advised to update their devices to these versions or later. The fix involves improved state management in the WebKit engine (Apple Support, Apple Support).

Community reactions

The vulnerability has also impacted other platforms that use WebKit, leading to security updates in various Linux distributions. Both Debian and Fedora have issued security advisories and patches for their webkit2gtk packages (Debian Advisory, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13020HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesNov 11, 2025
CVE-2025-59088HIGH8.6
  • Rocky LinuxRocky Linux
  • idm:DL1::ipa-selinux
NoYesNov 12, 2025
CVE-2025-13019HIGH8.1
  • NixOSNixOS
  • thunderbird
NoYesNov 11, 2025
CVE-2025-13018HIGH8.1
  • NixOSNixOS
  • MozillaFirefox-translations-other
NoYesNov 11, 2025
CVE-2025-59089MEDIUM5.9
  • Rocky LinuxRocky Linux
  • python3-ipatests
NoYesNov 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management