πŸ” CVE Alert

CVE-2025-66286

MEDIUM 4.7

Webkitgtk: authorization bypass through webpage::send-request signal handler

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests. Applications expect to use the WebPage::send-request signal handler to approve or reject all network requests. However, certain types of HTTP requests bypass this signal handler.

CWE CWE-639
Vendor red hat
Product red hat enterprise linux 6
Published Apr 23, 2026
Last Updated Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for red hat red hat enterprise linux 6

Be the first to know when new medium vulnerabilities affecting red hat red hat enterprise linux 6 are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
None
Availability
None

Affected Versions

Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 7
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected

References

NVD β†— CVE.org β†— EPSS Data β†—
access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-66286 bugs.webkit.org: https://bugs.webkit.org/show_bug.cgi?id=259787 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2424652

Credits

Red Hat would like to thank Albrecht Dreß for reporting this issue.