Description
A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is 442e2299530138d8f874fd885c565ba98a6318ba. It is suggested to install a patch to address this issue.
Published: 2026-05-08
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the sidx_box_read function of GPAC’s isomedia/box_code_base.c. Manipulation of the sidx box leads to unbounded resource allocation, which can exhaust memory or other system resources and cause the application to crash or become unresponsive. The weakness is a classic resource‑exhaustion flaw and is classified as CWE‑400 and CWE‑770.

Affected Systems

All releases of GPAC up to and including version 26.02.0 are affected. No higher‑numbered releases were mentioned as vulnerable. The affected product is GPAC, which is an open‑source multimedia framework used for packaging and processing media streams.

Risk and Exploitability

With a CVSS score of 4.8, the severity is moderate, though the lack of a remote attack vector means an attacker must compromise the local host or submit a malicious media file to a compromised GPAC instance to exercise the flaw. The EPSS score is not available, and the vulnerability is not listed in CISA KEV. The publicly disclosed exploit, referenced by commit 442e2299530138d8f874fd885c565ba98a6318ba, demonstrates that attackers can trigger the out‑of‑memory conditions when parsing crafted media. Consequently, the risk to any system that processes local media files is elevated, especially in environments where GPAC is exposed to untrusted input.

Generated by OpenCVE AI on May 8, 2026 at 02:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch identified by commit 442e2299530138d8f874fd885c565ba98a6318ba to GPAC releases 26.02.0 or earlier
  • Ensure that any installations of GPAC are upgraded or patched to a version newer than 26.02.0 before processing media from untrusted sources
  • Implement system‑level resource limits or monitoring to detect abnormal memory usage by GPAC and isolate the application if an out‑of‑memory condition occurs

Generated by OpenCVE AI on May 8, 2026 at 02:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 08 May 2026 01:45:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in GPAC up to 26.02.0. This affects the function sidx_box_read of the file src/isomedia/box_code_base.c. The manipulation leads to allocation of resources. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The identifier of the patch is 442e2299530138d8f874fd885c565ba98a6318ba. It is suggested to install a patch to address this issue.
Title GPAC box_code_base.c sidx_box_read allocation of resources
First Time appeared Gpac
Gpac gpac
Weaknesses CWE-400
CWE-770
CPEs cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*
Vendors & Products Gpac
Gpac gpac
References
Metrics cvssV2_0

{'score': 1.7, 'vector': 'AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-08T11:41:38.846Z

Reserved: 2026-05-07T17:07:46.851Z

Link: CVE-2026-8124

cve-icon Vulnrichment

Updated: 2026-05-08T11:41:35.445Z

cve-icon NVD

Status : Received

Published: 2026-05-08T02:16:08.000

Modified: 2026-05-08T02:16:08.000

Link: CVE-2026-8124

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T03:00:08Z

Weaknesses