Out-of-Bounds Affecting webkitgtk package, versions [,2.48.7)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (12th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Out-of-Bounds vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-WEBKITGTK-13023181
  • published26 Sept 2025
  • disclosed23 Sept 2025
  • creditBig Bear

Introduced: 23 Sep 2025

NewCVE-2025-43272  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade webkitgtk to version 2.48.7 or higher.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds due to improper memory handling. An attacker can cause a process crash or potentially execute arbitrary code by tricking a user into processing or loading malicious web content.

Note:

This is only exploitable if packages that require WebKitGTK4 (such as evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, or yelp) are installed and used via a graphical interface to process untrusted web content, for example through GNOME. In gnome-shell, exploitation can occur from the local network without user interaction.

Workaround

This vulnerability can be mitigated by removing the affected packages that require WebKitGTK4 or by avoiding the processing or loading of untrusted web content. WebKitGTK3 can also be removed without impacting system functionality.

CVSS Base Scores

version 4.0
version 3.1