Get a Demo

Let's Patch It!

Book a short call with one our specialists, we'll walk you through how Endor Patches work, and ask you a few questions about your environment (like your primary programming languages and repository management). We'll also send you an email right after you fill out the form, feel free to reply with any questions you have in advance!

CVE

CVE-2025-43431

webkitgtk: Processing maliciously crafted web content may lead to memory corruption (important)
Back to all
CVE

CVE-2025-43431

webkitgtk: Processing maliciously crafted web content may lead to memory corruption (important)

DOCUMENTATION: A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling. 

            STATEMENT: To exploit this issue, an attacker needs to trick a user into processing or loading malicious web content. Due to this reason, this flaw has been rated with an important severity.

Additionally, this issue can cause memory corruption and the possibility of remote code execution is not discarded.

            MITIGATION: Do not process or load untrusted web content with WebKitGTK.

In Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.

This vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.

To mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.

Additionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.

Package Versions Affected

Package Version
patch Availability
No items found.

Automatically patch vulnerabilities without upgrading

Fix Without Upgrading
Detect compatible fix
Apply safe remediation
Fix with a single pull request

CVSS Version

Severity
Base Score
CVSS Version
Score Vector
C
H
U
8.8
-
3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
C
H
U
-
C
H
U
-

Related Resources

No items found.

References

https://access.redhat.com/security/cve/CVE-2025-43431

Severity

0

CVSS Score
0
10

Basic Information

Ecosystem
Base CVSS
0
EPSS Probability
0.00064%
EPSS Percentile
0.2024%
Introduced Version
0
Fix Available
0:2.50.3-1.el8_10,0:2.50.3-1.el9_7,2.50.2-1~deb13u1,2.50.2-1~deb12u1,2.50.2-1~deb11u1,0:2.50.2-0ubuntu0.24.04.2,0:2.50.2-0ubuntu0.22.04.2,0:2.50.4-1.amzn2

Fix Critical Vulnerabilities Instantly

Secure your app without upgrading.
Fix Without Upgrading