// For flags

CVE-2020-13543

webkitgtk: use-after-free may lead to arbitrary code execution

Severity Score

8.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.

Se presenta una vulnerabilidad de ejecución de código en la funcionalidad WebSocket de Webkit WebKitGTK versión 2.30.0. Una página web especialmente diseñada puede desencadenar una vulnerabilidad de uso de la memoria previamente liberada que puede conllevar a una ejecución de código remota. Un atacante puede lograr que un usuario visite una página web para desencadenar esta vulnerabilidad

An update that fixes 5 vulnerabilities is now available. This update for webkit2gtk3 fixes the following issues. Fixed a use after free which could have led to arbitrary code execution. Fixed a use after free which could have led to arbitrary code execution. Fixed a type confusion which could have led to arbitrary code execution. Fixed a use after free which could have led to arbitrary code execution. Fixed an out of bounds write which could have led to arbitrary code execution. Same version. With JIT disabled. Also disable sampling profiler, since it conflicts with c_loop. This update was imported from the SUSE:SLE-15:Update update project.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-05-26 CVE Reserved
  • 2020-12-03 CVE Published
  • 2024-08-04 CVE Updated
  • 2024-08-04 First Exploit
  • 2025-07-15 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-416: Use After Free
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Webkitgtk
Search vendor "Webkitgtk"
Webkitgtk
Search vendor "Webkitgtk" for product "Webkitgtk"
2.30.0
Search vendor "Webkitgtk" for product "Webkitgtk" and version "2.30.0"
-
Affected