{"api_version":"1","generated_at":"2026-04-23T02:37:50+00:00","cve":"CVE-2022-42826","urls":{"html":"https://cve.report/CVE-2022-42826","api":"https://cve.report/api/cve/CVE-2022-42826.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-42826","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-42826"},"summary":{"title":"CVE-2022-42826","description":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution.","state":"PUBLIC","assigner":"product-security@apple.com","published_at":"2023-02-27 20:15:00","updated_at":"2023-05-30 06:15:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/202305-32","name":"GLSA-202305-32","refsource":"GENTOO","tags":[],"title":"WebKitGTK+: Multiple Vulnerabilities (GLSA 202305-32) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.apple.com/en-us/HT213495","name":"https://support.apple.com/en-us/HT213495","refsource":"MISC","tags":[],"title":"About the security content of Safari 16.1 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213488","name":"https://support.apple.com/en-us/HT213488","refsource":"MISC","tags":[],"title":"About the security content of macOS Ventura 13 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/en-us/HT213489","name":"https://support.apple.com/en-us/HT213489","refsource":"MISC","tags":[],"title":"About the security content of iOS 16.1 and iPadOS 16 - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-42826","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-42826","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"42826","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"ipados","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"42826","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"iphone_os","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"42826","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2022","cve_id":"42826","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"safari","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-42826","qid":"160629","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2023-2256)"},{"cve":"CVE-2022-42826","qid":"160691","title":"Oracle Enterprise Linux Security Update for webkit2gtk3 (ELSA-2023-2834)"},{"cve":"CVE-2022-42826","qid":"181540","title":"Debian Security Update for webkit2gtk (DLA 3308-1)"},{"cve":"CVE-2022-42826","qid":"181542","title":"Debian Security Update for webkit2gtk (DSA 5340-1)"},{"cve":"CVE-2022-42826","qid":"181543","title":"Debian Security Update for wpewebkit (DSA 5341-1)"},{"cve":"CVE-2022-42826","qid":"182793","title":"Debian Security Update for webkit2gtkwpewebkit (CVE-2022-42826)"},{"cve":"CVE-2022-42826","qid":"199171","title":"Ubuntu Security Notification for WebKitGTK Vulnerabilities (USN-5867-1)"},{"cve":"CVE-2022-42826","qid":"241472","title":"Red Hat Update for webkit2gtk3 (RHSA-2023:2256)"},{"cve":"CVE-2022-42826","qid":"241497","title":"Red Hat Update for webkit2gtk3 (RHSA-2023:2834)"},{"cve":"CVE-2022-42826","qid":"283686","title":"Fedora Security Update for webkitgtk (FEDORA-2023-5210df1dd1)"},{"cve":"CVE-2022-42826","qid":"283729","title":"Fedora Security Update for webkit2gtk3 (FEDORA-2023-efe0594c2b)"},{"cve":"CVE-2022-42826","qid":"355438","title":"Amazon Linux Security Advisory for webkitgtk4 : ALAS2-2023-2088"},{"cve":"CVE-2022-42826","qid":"710737","title":"Gentoo Linux WebKitGTK+ Multiple Vulnerabilities (GLSA 202305-32)"},{"cve":"CVE-2022-42826","qid":"753782","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:0490-1)"},{"cve":"CVE-2022-42826","qid":"753793","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:0573-1)"},{"cve":"CVE-2022-42826","qid":"753870","title":"SUSE Enterprise Linux Security Update for webkit2gtk3 (SUSE-SU-2023:1681-1)"},{"cve":"CVE-2022-42826","qid":"941009","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2023:2256)"},{"cve":"CVE-2022-42826","qid":"941078","title":"AlmaLinux Security Update for webkit2gtk3 (ALSA-2023:2834)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2022-42826","ASSIGNER":"product-security@apple.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Apple","product":{"product_data":[{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"13"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"16.1"}]}},{"product_name":"macOS","version":{"version_data":[{"version_affected":"<","version_value":"16.1"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Processing maliciously crafted web content may lead to arbitrary code execution"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213488","name":"https://support.apple.com/en-us/HT213488"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213489","name":"https://support.apple.com/en-us/HT213489"},{"refsource":"MISC","url":"https://support.apple.com/en-us/HT213495","name":"https://support.apple.com/en-us/HT213495"},{"refsource":"GENTOO","name":"GLSA-202305-32","url":"https://security.gentoo.org/glsa/202305-32"}]},"description":{"description_data":[{"lang":"eng","value":"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13, iOS 16.1 and iPadOS 16, Safari 16.1. Processing maliciously crafted web content may lead to arbitrary code execution."}]}},"nvd":{"publishedDate":"2023-02-27 20:15:00","lastModifiedDate":"2023-05-30 06:15:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*","versionEndExcluding":"13.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*","versionEndExcluding":"16.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*","versionEndExcluding":"16.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:*","versionEndExcluding":"16.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}