Description
A vulnerability was detected in ggml-org whisper.cpp up to 1.8.2. Affected is the function read_audio_data of the file /whisper.cpp/examples/common-whisper.cpp. The manipulation results in use after free. The attack requires a local approach. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
1.8.1
1.8.2
Timeline
| 2025-12-12: | Advisory disclosed |
| 2025-12-12: | VulDB entry created |
| 2025-12-12: | VulDB entry last update |
Credits
repro
Oneafter (VulDB User)
References
vuldb.com/?id.336193 (VDB-336193 | ggml-org whisper.cpp common-whisper.cpp read_audio_data use after free)
vuldb.com/?ctiid.336193 (VDB-336193 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.703886 (Submit #703886 | ggerganov whisper.cpp v1.8.2 Free of Memory not on the Heap)
github.com/ggml-org/whisper.cpp/issues/3501
github.com/oneafter/InvalidFree/blob/main/repro
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.