CVE-2025-30466
Apple Safari vulnerability analysis and mitigation

Overview

CVE-2025-30466 is a security vulnerability affecting Apple Safari and related operating systems (Safari 18.4, iOS 18.4, iPadOS 18.4, visionOS 2.4, and macOS Sequoia 15.4) that allows a website to bypass Same Origin Policy. The vulnerability was discovered by Jaydev Ahire and @RenwaX23, and was publicly disclosed on May 28, 2025 (Apple Support).

Technical details

The vulnerability stems from a state management issue in Safari's handling of web content. It was assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with a vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a highly severe vulnerability that can be exploited remotely without requiring privileges or user interaction (Rapid7).

Impact

The vulnerability allows malicious websites to bypass the Same Origin Policy, a fundamental security mechanism that prevents websites from accessing data from other domains. This could potentially lead to cross-site scripting attacks, data theft, and unauthorized access to sensitive information from other websites (Apple Support).

Mitigation and workarounds

Apple has addressed this vulnerability through improved state management in Safari 18.4, iOS 18.4, iPadOS 18.4, visionOS 2.4, and macOS Sequoia 15.4. Users are strongly advised to update their systems to these versions to protect against potential exploitation (Apple Support).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management