Home

Description

This affects versions of the package exifreader before 4.39.0. A crafted image containing an ICC mluc tag can set an attacker-controlled record count together with a zero record size. During parsing, ExifReader repeatedly processes the same record and appends entries to an array without sufficient bounds validation, causing excessive memory growth. In applications that parse attacker-supplied images, this may lead to denial of service through memory exhaustion.

PUBLISHED Reserved 2026-05-18 | Published 2026-05-19 | Updated 2026-05-19 | Assigner snyk




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P

Problem types

Improper Validation of Specified Quantity in Input

Credits

Yuki Matsuhashi

References

security.snyk.io/vuln/SNYK-JS-EXIFREADER-16689335 exploit

security.snyk.io/vuln/SNYK-JS-EXIFREADER-16689335

gist.github.com/...tsuhashi/3243ea38e5fbf8cfe19b624f04c9f4b4

github.com/...ommit/c9d88b67e127b2dcc7b46e328df468257fb2dc30

cve.org (CVE-2026-8813)

nvd.nist.gov (CVE-2026-8813)

Download JSON