Description
A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Published: 2026-04-07
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

A heap-based buffer overflow exists in LibRaw's x3f_thumb_loader functionality. A maliciously crafted image file can trigger an overflow that allows an attacker to execute arbitrary code within the context of the application that uses LibRaw. The flaw is classified under CWE-120 and CWE-190, indicating a vulnerability that involves improper memory handling and signed integer issues.

Affected Systems

The vulnerability affects LibRaw version 0.22.0 and earlier releases that contain the same commit. Applications that use LibRaw to process X3F images, such as photo editors, imaging tools, and other software that imports this format, are vulnerable when handling files from untrusted sources.

Risk and Exploitability

The CVSS score of 9.8 marks this issue as critical, while the EPSS score of less than 1% points to a currently low probability of exploitation. The likely attack vector is local file processing; however, if an application that incorporates LibRaw accepts uploaded images over a network, remote exploitation becomes possible. The vulnerability is not listed in the CISA KEV catalog, so no known widespread exploitation is documented.

Generated by OpenCVE AI on April 10, 2026 at 23:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch or update LibRaw to a version that includes the fix (e.g., any release newer than 0.22.0).
  • Temporarily avoid processing untrusted image files with LibRaw until the patch is applied.
  • Verify that applications using LibRaw do not accept user-supplied files from untrusted sources or implement input validation.

Generated by OpenCVE AI on April 10, 2026 at 23:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:libraw:libraw:0.22.0:*:*:*:*:*:*:*

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Libraw
Libraw libraw
Vendors & Products Libraw
Libraw libraw

Wed, 08 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Title LibRaw: LibRaw: Arbitrary code execution via specially crafted image file
Weaknesses CWE-120
References
Metrics threat_severity

None

threat_severity

Important


Tue, 07 Apr 2026 18:00:00 +0000


Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
Weaknesses CWE-190
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2026-04-08T03:55:49.049Z

Reserved: 2026-01-26T13:34:18.923Z

Link: CVE-2026-20889

cve-icon Vulnrichment

Updated: 2026-04-07T16:23:21.141Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T15:17:35.300

Modified: 2026-04-10T20:51:04.523

Link: CVE-2026-20889

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-07T13:49:27Z

Links: CVE-2026-20889 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-13T14:27:11Z

Weaknesses