Description
miniaudio version 0.11.25 and earlier (fixed in commits 1df46ae and 1df46ae) contain a heap out-of-bounds read vulnerability in the WAV BEXT metadata parser that allows attackers to trigger memory access violations by processing crafted WAV files. Attackers can exploit improper null-termination handling in the coding history field to cause out-of-bounds reads past the allocated metadata pool, resulting in application crashes or denial of service.
Published: 2026-03-17
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Out-of-Bounds Read
Action: Apply Patch
AI Analysis

Impact

The vulnerability resides in the BEXT metadata parser of miniaudio versions up to 0.11.25. Improper null-termination handling in the coding history field allows an attacker to create a crafted WAV file that triggers a heap out-of-bounds read. Key impact is memory access violation that can lead to application crashes or denial of service. No evidence of remote code execution or data exposure is provided. The weakness is categorized as CWE‑170 (Improper Null Termination).

Affected Systems

Affected product: mackron:miniaudio version 0.11.25 and earlier. The CPE string indicates all builds of the library may be impacted. No other vendor or product versions are listed.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. EPSS below 1% suggests low probability of active exploitation at present. The vulnerability is not listed in CISA KEV, implying it is not a known actively exploited vulnerability. The likely attack vector involves user-controlled WAV files processed by applications using the vulnerable miniaudio library; an attacker would need the ability to supply or force processing of a malicious file. The risk, while moderate, can cause service interruptions and should be mitigated promptly. The mitigation is straightforward: upgrade to a fixed version. If an upgrade is not immediately possible, monitor for crashes related to WAV playback and consider input validation patches.

Generated by OpenCVE AI on March 19, 2026 at 20:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update miniaudio to version 0.11.26 or newer to eliminate the out-of-bounds read
  • If an update is delayed, add defensive checks to validate the null-termination of the coding history string before parsing
  • Configure the application environment to restrict unwarranted WAV file inputs from untrusted users
  • Monitor application logs for crash patterns associated with WAV processing and correlate with potential malicious activity

Generated by OpenCVE AI on March 19, 2026 at 20:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Description miniaudio version 0.11.25 and earlier contain a heap out-of-bounds read vulnerability in the WAV BEXT metadata parser that allows attackers to trigger memory access violations by processing crafted WAV files. Attackers can exploit improper null-termination handling in the coding history field to cause out-of-bounds reads past the allocated metadata pool, resulting in application crashes or denial of service. miniaudio version 0.11.25 and earlier (fixed in commits 1df46ae and 1df46ae) contain a heap out-of-bounds read vulnerability in the WAV BEXT metadata parser that allows attackers to trigger memory access violations by processing crafted WAV files. Attackers can exploit improper null-termination handling in the coding history field to cause out-of-bounds reads past the allocated metadata pool, resulting in application crashes or denial of service.
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Thu, 19 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mackron:miniaudio:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Wed, 18 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Mackron
Mackron miniaudio
Vendors & Products Mackron
Mackron miniaudio
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Tue, 17 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 17 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description miniaudio version 0.11.25 and earlier contain a heap out-of-bounds read vulnerability in the WAV BEXT metadata parser that allows attackers to trigger memory access violations by processing crafted WAV files. Attackers can exploit improper null-termination handling in the coding history field to cause out-of-bounds reads past the allocated metadata pool, resulting in application crashes or denial of service.
Title mackron / miniaudio Out-of-Bounds Read in BEXT Coding History Parsing
Weaknesses CWE-170
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


Subscriptions

Mackron Miniaudio
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-27T15:38:10.654Z

Reserved: 2026-03-16T18:11:41.757Z

Link: CVE-2026-32837

cve-icon Vulnrichment

Updated: 2026-03-17T19:59:34.348Z

cve-icon NVD

Status : Modified

Published: 2026-03-17T20:16:14.177

Modified: 2026-04-27T16:16:44.043

Link: CVE-2026-32837

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-17T19:10:06Z

Links: CVE-2026-32837 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-24T10:54:45Z

Weaknesses