Search for vulnerabilities
Vulnerability details: VCID-srwt-sx8p-s7bg
Vulnerability ID VCID-srwt-sx8p-s7bg
Aliases CVE-2023-40451
Summary This issue was addressed with improved iframe sandbox enforcement. This issue is fixed in Safari 17. An attacker with JavaScript execution may be able to execute arbitrary code.
Status Published
Exploitability 0.5
Weighted Severity 7.9
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
cvssv3 8.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
epss 0.00208 https://api.first.org/data/v1/epss?cve=CVE-2023-40451
ssvc Track http://seclists.org/fulldisclosure/2023/Oct/2
cvssv3.1 8.8 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 8.8 https://nvd.nist.gov/vuln/detail/CVE-2023-40451
ssvc Track https://security.gentoo.org/glsa/202401-33
ssvc Track https://support.apple.com/en-us/HT213941
ssvc Track http://www.openwall.com/lists/oss-security/2023/09/28/3
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
https://api.first.org/data/v1/epss?cve=CVE-2023-40451
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
https://webkitgtk.org/security/WSA-2023-0009.html
2 http://seclists.org/fulldisclosure/2023/Oct/2
202401-33 https://security.gentoo.org/glsa/202401-33
2241409 https://bugzilla.redhat.com/show_bug.cgi?id=2241409
3 http://www.openwall.com/lists/oss-security/2023/09/28/3
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
CVE-2023-40451 https://nvd.nist.gov/vuln/detail/CVE-2023-40451
HT213941 https://support.apple.com/en-us/HT213941
RHSA-2023:6535 https://access.redhat.com/errata/RHSA-2023:6535
RHSA-2023:7055 https://access.redhat.com/errata/RHSA-2023:7055
RHSA-2025:10364 https://access.redhat.com/errata/RHSA-2025:10364
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/ Found at http://seclists.org/fulldisclosure/2023/Oct/2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2023-40451
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/ Found at https://security.gentoo.org/glsa/202401-33

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/ Found at https://support.apple.com/en-us/HT213941

Vector: SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/ Found at http://www.openwall.com/lists/oss-security/2023/09/28/3
Exploit Prediction Scoring System (EPSS)
Percentile 0.43434
EPSS Score 0.00208
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T09:43:11.704083+00:00 Vulnrichment Import https://github.com/cisagov/vulnrichment/blob/develop/2023/40xxx/CVE-2023-40451.json 37.0.0