Home

Description

An API design flaw in WebKitGTK and WPE WebKit allows untrusted web content to unexpectedly perform IP connections, DNS lookups, and HTTP requests. Applications expect to use the WebPage::send-request signal handler to approve or reject all network requests. However, certain types of HTTP requests bypass this signal handler.

PUBLISHED Reserved 2025-11-26 | Published 2026-04-23 | Updated 2026-04-28 | Assigner redhat




MEDIUM: 4.7CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

Problem types

Authorization Bypass Through User-Controlled Key

Product status

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2025-12-23:Reported to Red Hat.
2026-04-23:Made public.

Credits

Red Hat would like to thank Albrecht Dreß for reporting this issue.

References

access.redhat.com/security/cve/CVE-2025-66286 vdb-entry

bugs.webkit.org/show_bug.cgi?id=259787

bugzilla.redhat.com/show_bug.cgi?id=2424652 (RHBZ#2424652) issue-tracking

cve.org (CVE-2025-66286)

nvd.nist.gov (CVE-2025-66286)

Download JSON