{"api_version":"1","generated_at":"2026-04-22T21:37:37+00:00","cve":"CVE-2021-30890","urls":{"html":"https://cve.report/CVE-2021-30890","api":"https://cve.report/api/cve/CVE-2021-30890.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-30890","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-30890"},"summary":{"title":"CVE-2021-30890","description":"A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2021-08-24 19:15:00","updated_at":"2023-11-07 03:33:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://www.debian.org/security/2021/dsa-5031","name":"DSA-5031","refsource":"","tags":[],"title":"Debian -- Security Information -- DSA-5031-1 wpewebkit","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/","name":"FEDORA-2022-f7366e60cb","refsource":"","tags":[],"title":"[SECURITY] Fedora 34 Update: webkit2gtk3-2.34.4-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT212867","name":"https://support.apple.com/en-us/HT212867","refsource":"MISC","tags":[],"title":"About the security content of iOS 15.1 and iPadOS 15.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT212869","name":"https://support.apple.com/en-us/HT212869","refsource":"","tags":[],"title":"About the security content of macOS Monterey 12.0.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/","name":"FEDORA-2022-f7366e60cb","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 34 Update: webkit2gtk3-2.34.4-1.fc34 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/","name":"FEDORA-2022-25a98f5d55","refsource":"","tags":[],"title":"[SECURITY] Fedora 35 Update: webkit2gtk3-2.34.4-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2021/dsa-5030","name":"DSA-5030","refsource":"","tags":[],"title":"Debian -- Security Information -- DSA-5030-1 webkit2gtk","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT212874","name":"https://support.apple.com/en-us/HT212874","refsource":"MISC","tags":[],"title":"About the security content of watchOS 8.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT212876","name":"https://support.apple.com/en-us/HT212876","refsource":"","tags":[],"title":"About the security content of tvOS 15.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/","name":"FEDORA-2022-25a98f5d55","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 35 Update: webkit2gtk3-2.34.4-2.fc35 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://www.openwall.com/lists/oss-security/2021/12/20/6","name":"[oss-security] 20211220 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0007","refsource":"","tags":[],"title":"oss-security - WebKitGTK and WPE WebKit Security Advisory WSA-2021-0007","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-30890","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-30890","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipad_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"12.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"tvos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"watchos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"34","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"30890","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"fedoraproject","cpe5":"fedora","cpe6":"35","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-30890","qid":"159799","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2022-1777)"},{"cve":"CVE-2021-30890","qid":"178953","title":"Debian Security Update for wpewebkit (DSA 5031-1)"},{"cve":"CVE-2021-30890","qid":"178954","title":"Debian Security Update for webkit2gtk (DSA 5030-1)"},{"cve":"CVE-2021-30890","qid":"182286","title":"Debian Security Update for webkit2gtkwpewebkit (CVE-2021-30890)"},{"cve":"CVE-2021-30890","qid":"198615","title":"Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-5213-1)"},{"cve":"CVE-2021-30890","qid":"240305","title":"Red Hat Update for webkit2gtk3 security (RHSA-2022:1777)"},{"cve":"CVE-2021-30890","qid":"282274","title":"Fedora Security Update for webkit2gtk3 (FEDORA-2022-25a98f5d55)"},{"cve":"CVE-2021-30890","qid":"282347","title":"Fedora Security Update for webkit2gtk3 (FEDORA-2022-f7366e60cb)"},{"cve":"CVE-2021-30890","qid":"296063","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 45.119.2 Missing (CPUAPR2022)"},{"cve":"CVE-2021-30890","qid":"355438","title":"Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2023-2088"},{"cve":"CVE-2021-30890","qid":"376012","title":"Apple MacOS Monterey 12.0.1 Not Installed (HT212869)"},{"cve":"CVE-2021-30890","qid":"376059","title":"Apple Safari Multiple Vulnerabilities (HT212875)"},{"cve":"CVE-2021-30890","qid":"502396","title":"Alpine Linux Security Update for webkit2gtk"},{"cve":"CVE-2021-30890","qid":"610378","title":"Apple iOS 15.1 and iPadOS 15.1 Security Update Missing (HT212867)"},{"cve":"CVE-2021-30890","qid":"710570","title":"Gentoo Linux WebkitGTK+ Multiple Vulnerabilities (GLSA 202202-01)"},{"cve":"CVE-2021-30890","qid":"751623","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0142-1)"},{"cve":"CVE-2021-30890","qid":"751646","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0183-1)"},{"cve":"CVE-2021-30890","qid":"751648","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2022:0182-1)"},{"cve":"CVE-2021-30890","qid":"751659","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2022:0182-1)"},{"cve":"CVE-2021-30890","qid":"751755","title":"OpenSUSE Security Update for webkit2gtk3 (openSUSE-SU-2022:0182-2)"},{"cve":"CVE-2021-30890","qid":"940505","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2022:1777)"},{"cve":"CVE-2021-30890","qid":"960138","title":"Rocky Linux Security Update for webkit2gtk3 (RLSA-2022:1777)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-30890","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"iOS and iPadOS","version":{"version_data":[{"version_affected":"<","version_value":"15.1"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"12.0"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"8.1"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"15.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing maliciously crafted web content may lead to universal cross site scripting"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.apple.com/en-us/HT212869","name":"https://support.apple.com/en-us/HT212869"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT212867","name":"https://support.apple.com/en-us/HT212867"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT212874","name":"https://support.apple.com/en-us/HT212874"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT212876","name":"https://support.apple.com/en-us/HT212876"},{"refsource":"MLIST","name":"[oss-security] 20211220 WebKitGTK and WPE WebKit Security Advisory WSA-2021-0007","url":"http://www.openwall.com/lists/oss-security/2021/12/20/6"},{"refsource":"DEBIAN","name":"DSA-5030","url":"https://www.debian.org/security/2021/dsa-5030"},{"refsource":"DEBIAN","name":"DSA-5031","url":"https://www.debian.org/security/2021/dsa-5031"},{"refsource":"FEDORA","name":"FEDORA-2022-25a98f5d55","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"},{"refsource":"FEDORA","name":"FEDORA-2022-f7366e60cb","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"}]},"description":{"description_data":[{"lang":"eng","value":"A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting."}]}},"nvd":{"publishedDate":"2021-08-24 19:15:00","lastModifiedDate":"2023-11-07 03:33:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"12.0.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*","versionEndExcluding":"15.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*","versionEndExcluding":"8.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"15.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"15.1","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"30890","Ordinal":"206168","Title":"CVE-2021-30890","CVE":"CVE-2021-30890","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"30890","Ordinal":"1","NoteData":"A logic issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, iOS 15.1 and iPadOS 15.1, watchOS 8.1, tvOS 15.1. Processing maliciously crafted web content may lead to universal cross site scripting.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"30890","Ordinal":"2","NoteData":"2021-08-24","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"30890","Ordinal":"3","NoteData":"2022-02-05","Type":"Other","Title":"Modified"}]}}}