Description
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the CRW image parser. This issue has been patched in version 0.28.8.
Published: 2026-03-02
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

The vulnerability occurs when Exiv2 parses CRW image files, where the internal CrwMap::decode0x0805 function performs an out‑of‑bounds read. This allows an adversary to read unintended data from memory, potentially leaking sensitive information such as metadata or other data residing in the process address space. The weakness is classified as CWE‑125, a classic out‑of‑bounds read that can expose confidential data but does not allow arbitrary code execution or privilege escalation based on the current evidence.

Affected Systems

Vulnerable versions are any releases of the Exiv2 library prior to 0.28.8. Applications, utilities, or services that rely on this library to handle CRW images—such as image editors, metadata processors, or automated media ingestion pipelines—could be impacted. The exact scope depends on the systems that use older Exiv2 binaries or source code.

Risk and Exploitability

The CVSS score of 2.7 indicates low overall impact, and the EPSS score of less than 1 percent suggests a very low probability of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Attackers would likely need to supply a crafted CRW file to the vulnerable application, inferring that the primary attack vector is local file input or potentially remote if the application accepts user‑supplied image data over a network. No known exploit code is publicly available, and the condition requires the parser to be invoked with the specific malformed data referenced in the patch commit.

Generated by OpenCVE AI on April 18, 2026 at 10:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Exiv2 to version 0.28.8 or newer to patch the out‑of‑bounds read vulnerability.
  • If an upgrade is not immediately feasible, recompile code to exclude CRW support or disable CRW parsing in the application configuration.
  • Implement a temporary policy to reject or sanitize CRW files until the library is upgraded.

Generated by OpenCVE AI on April 18, 2026 at 10:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 05 Mar 2026 12:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H'}


Thu, 05 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}

threat_severity

Low


Wed, 04 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Exiv2
Exiv2 exiv2
Vendors & Products Exiv2
Exiv2 exiv2

Mon, 02 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Mar 2026 19:45:00 +0000

Type Values Removed Values Added
Description Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the CRW image parser. This issue has been patched in version 0.28.8.
Title Exiv2: Out-of-bounds read in CrwMap::decode0x0805
Weaknesses CWE-125
References
Metrics cvssV4_0

{'score': 2.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-02T20:15:22.706Z

Reserved: 2026-02-06T21:08:39.129Z

Link: CVE-2026-25884

cve-icon Vulnrichment

Updated: 2026-03-02T20:15:16.160Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-02T20:16:26.560

Modified: 2026-03-05T12:32:39.417

Link: CVE-2026-25884

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-02T19:41:21Z

Links: CVE-2026-25884 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:15:25Z

Weaknesses