Description
A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privileges this could enable subsequent exploit on the system.
Published: 2026-05-01
Score: 8.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free (UAF) condition occurs in the KEGLGetPoolBuffers function of Imagination Technologies’ Graphics DDK, which can be triggered by loading specially crafted WebGPU content in a web page. The vulnerability may cause a write UAF crash in the GPU GLES user‑space shared library. If the GPU process runs with system privileges, the crash could allow an attacker to gain further control over the system, potentially leading to execution of arbitrary code or other high‑impact actions. The weakness aligns with CWE‑416, indicating that memory is freed and subsequently accessed for writing.

Affected Systems

Imagination Technologies Graphics DDK is the affected product. The impact applies to any systems where the GPU DDK is deployed and the GPU GLES render process is executed with system privileges. Specific platform or version details are not disclosed in the available information, so all installations of the DDK that support WebGPU should be considered potentially at risk.

Risk and Exploitability

The vulnerability can be accessed via a malicious web page that includes unusual WebGPU content, making the attack vector WebGL reachable and inferred to be remote through a browser. The CVSS score is 8.1, indicating high severity. There is no EPSS score and the issue is not listed in the CISA KEV catalog. The absence of an exploit probability metric suggests limited public exploitation data; however, the possibility of subsequent exploitation when system privileges are held means the risk is significant if an attacker can supply the malicious content. Users should evaluate whether their GPU workloads run with elevated privileges and monitor for any abnormal GPU behavior.

Generated by OpenCVE AI on May 1, 2026 at 22:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Check for and apply the latest Imagination Technologies Graphics DDK patch that addresses the KEGLGetPoolBuffers UAF condition
  • Disable or limit WebGPU usage in browsers or web applications if not required for functionality
  • Ensure that GPU processes run with the minimal privileges necessary, avoiding system‑level execution for graphics workloads

Generated by OpenCVE AI on May 1, 2026 at 22:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 01 May 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Fri, 01 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 16:15:00 +0000

Type Values Removed Values Added
Description A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privileges this could enable subsequent exploit on the system.
Title GPU DDK - Write UAF in KEGLGetPoolBuffers, WebGL reachable
Weaknesses CWE-416
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: imaginationtech

Published:

Updated: 2026-05-01T19:19:02.700Z

Reserved: 2026-01-06T15:50:36.205Z

Link: CVE-2026-22166

cve-icon Vulnrichment

Updated: 2026-05-01T17:57:05.632Z

cve-icon NVD

Status : Received

Published: 2026-05-01T16:16:29.563

Modified: 2026-05-01T20:16:21.323

Link: CVE-2026-22166

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T23:00:14Z

Weaknesses