Description
A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.
Published: 2026-01-26
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Local Null Pointer Dereference leading to Process Crash
Action: Patch Immediately
AI Analysis

Impact

A vulnerability exists in GPAC versions up to 2.4.0 within the DumpMovieInfo function of applications/mp4box/filedump.c. The flaw causes a null pointer dereference when the function processes certain input, which can lead to a crash of the GPAC process. This type of error does not provide an attacker with code execution or privilege escalation capabilities, but it can result in a denial of service by terminating the application.

Affected Systems

The affected vendor is GPAC, and the issue affects all up to and including 2.4.0. No other versions are presently identified as vulnerable. Users running these versions on any operating system are potentially impacted, as the vulnerability is triggered by local input to the DumpMovieInfo function.

Risk and Exploitability

The CVSS score of 4.8 indicates a moderate severity, and the EPSS score is less than 1%, suggesting that exploitation is unlikely but still possible. The vulnerability is not listed in the CISA KEV catalog. The exploit is publicly available, but the attack vector is local, meaning that an attacker must have the ability to run code on the affected system or provide malicious input directly. Given the public release of the exploit, the risk to systems that run GPAC in an exposed or privileged context remains a moderate concern.

Generated by OpenCVE AI on April 18, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Obtain the patch commit (d45c264c20addf0c1cc05124ede33f8ffa800e68) from the GPAC GitHub repository and apply it to the source code before rebuilding or reinstalling GPAC
  • Upgrade to the latest GPAC release that includes the patch—verify that the version number is higher than 2.4.0
  • Restrict GPAC execution to trusted users or disable the DumpMovieInfo feature if it is not required

Generated by OpenCVE AI on April 18, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
References

Wed, 28 Jan 2026 15:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Gpac
Gpac gpac
Vendors & Products Gpac
Gpac gpac

Mon, 26 Jan 2026 03:45:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in GPAC up to 2.4.0. Affected by this vulnerability is the function DumpMovieInfo of the file applications/mp4box/filedump.c. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. The patch is identified as d45c264c20addf0c1cc05124ede33f8ffa800e68. It is advisable to implement a patch to correct this issue.
Title GPAC filedump.c DumpMovieInfo null pointer dereference
Weaknesses CWE-404
CWE-476
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:55:57.311Z

Reserved: 2026-01-25T09:55:16.575Z

Link: CVE-2026-1416

cve-icon Vulnrichment

Updated: 2026-01-26T15:26:42.439Z

cve-icon NVD

Status : Modified

Published: 2026-01-26T04:16:09.960

Modified: 2026-02-23T09:16:54.420

Link: CVE-2026-1416

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:00:08Z

Weaknesses