Description
A vulnerability was identified in GPAC up to 2.4.0. Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c. The manipulation of the argument Name leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is af951b892dfbaaa38336ba2eba6d6a42c25810fd. To fix this issue, it is recommended to deploy a patch.
Published: 2026-01-26
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via local crash
Action: Patch Now
AI Analysis

Impact

A null pointer dereference occurs in the gf_media_export_webvtt_metadata function when the argument Name is manipulated. The vulnerability leads to a local crash of the GPAC media export process, effectively denying service to the impacted user or process.

Affected Systems

The flaw affects GPAC versions up to 2.4.0. The product is the GPAC media framework, with no specific sub‑releases identified beyond the 2.4.0 upper bound.

Risk and Exploitability

The CVSS score is 4.8, reflecting a medium severity impact. The EPSS score is underspecified as less than 1 %, indicating a low likelihood of exploitation. The vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. Attacks require local access to the affected system, yet publicly available exploit code exists. In practice, the risk is a moderate local denial of service with a low probability of occurrence.

Generated by OpenCVE AI on April 18, 2026 at 02:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update GPAC to a patched release that incorporates commit af951b892dfbaaa38336ba2eba6d6a42c25810fd or apply the specific patch from that commit
  • If a full upgrade cannot be performed immediately, disable or remove the gpac media_export_webvtt_metadata feature to prevent the vulnerability from being triggered
  • Monitor system logs for unexpected crashes or segmentation faults that may indicate an attempt to exploit the flaw

Generated by OpenCVE AI on April 18, 2026 at 02:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
References

Wed, 28 Jan 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Gpac
Gpac gpac
Vendors & Products Gpac
Gpac gpac

Mon, 26 Jan 2026 03:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in GPAC up to 2.4.0. Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c. The manipulation of the argument Name leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is af951b892dfbaaa38336ba2eba6d6a42c25810fd. To fix this issue, it is recommended to deploy a patch.
Title GPAC media_export.c gf_media_export_webvtt_metadata null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:55:44.829Z

Reserved: 2026-01-25T09:53:29.764Z

Link: CVE-2026-1415

cve-icon Vulnrichment

Updated: 2026-01-26T15:29:46.809Z

cve-icon NVD

Status : Modified

Published: 2026-01-26T03:15:49.780

Modified: 2026-02-23T09:16:54.200

Link: CVE-2026-1415

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T03:00:10Z

Weaknesses