CVE-2026-20660: A remote user may be able to write arbitrary files. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. (10th Mar 2026)

Preface: App Groups provide the legal doorway for shared access, while libxpc’s path handling acts as the security guard ensuring no one sneaks a forbidden object through that door while it’s open.

Background: Libxpc is a closed-source system library in Apple iOS (and macOS) that powers the XPC (Cross Process Communication) framework. It enables secure, lightweight communication between different applications and system services, allowing processes to share data and perform tasks on behalf of one another. It is critical for app sandboxing, stability, and system security.

In Apple’s iOS, path handling within the libxpc library is a critical mechanism for ensuring that file paths are securely and accurately managed during communication between different processes.

The primary purposes and functions include: Security & Sandbox Enforcement, Privilege Isolation, Safe Resource Sharing, Service Discovery and Vulnerability Mitigation.

Remark: In system operations, CFNetwork frequently utilizes libxpc to execute specific tasks:

  • WebKit Networking: When browsers like Safari load pages, they use the com.apple.WebKit.Networking.xpc component to request resources. This involves CFNetwork communicating via XPC.
  • Background Transfers: For background downloads or syncs, CFNetwork interacts with system network daemons through XPC connections to maintain the session while the app is suspended.

Vulnerability detail: A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote user may be able to write arbitrary files.

NVD Published Date: 02/11/2026
NVD Last Modified: 02/13/2026

Official announcement: Please refer to the link for details –

https://nvd.nist.gov/vuln/detail/CVE-2026-20660

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.