Home

Description

A security vulnerability has been detected in GPAC 26.03-DEV. Affected by this vulnerability is the function svgin_process of the file src/filters/load_svg.c of the component SVG Parser. The manipulation leads to out-of-bounds write. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 7618d7206cdeb3c28961dc97ab0ecabaff0c8af2. It is suggested to install a patch to address this issue.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-12 | Updated 2026-03-12 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 5.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
4.3AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Out-of-bounds Write

Memory Corruption

Timeline

2026-03-11:Advisory disclosed
2026-03-11:VulDB entry created
2026-03-11:VulDB entry last update

Credits

breakingbad (VulDB User) reporter

References

vuldb.com/?id.350538 (VDB-350538 | GPAC SVG Parser load_svg.c svgin_process out-of-bounds write) vdb-entry technical-description

vuldb.com/?ctiid.350538 (VDB-350538 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.769798 (Submit #769798 | GPAC 26.03-DEV Buffer Overflow) third-party-advisory

github.com/gpac/gpac/issues/3468 issue-tracking

github.com/user-attachments/files/25494042/poc_dims_oob.py exploit

github.com/...ommit/7618d7206cdeb3c28961dc97ab0ecabaff0c8af2 patch

github.com/gpac/gpac/ product

cve.org (CVE-2026-4016)

nvd.nist.gov (CVE-2026-4016)

Download JSON