Description
This affects versions of the package exifreader before 4.39.0. A crafted image containing an ICC mluc tag can set an attacker-controlled record count together with a zero record size. During parsing, ExifReader repeatedly processes the same record and appends entries to an array without sufficient bounds validation, causing excessive memory growth. In applications that parse attacker-supplied images, this may lead to denial of service through memory exhaustion.
Published: 2026-05-19
Score: 8.7 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in ExifReader versions older than 4.39.0. An attacker can embed a crafted image that contains an ICC mluc tag specifying an attacker‑controlled record count together with a zero record size. During parsing, the library processes the same record repeatedly and appends entries to an array without proper bounds validation, which causes unbounded memory growth. The result is an application exhausting available memory and potentially crashing. The weakness is a lack of bounds checking when handling an image metadata tag, leading to resource exhaustion. Depending on how the application integrates ExifReader, the denial of service could affect the entire process or only a single thread that performs image parsing.

Affected Systems

This issue affects the ExifReader JavaScript library. Any application that imports or uses this package and processes images supplied by untrusted sources will be impacted. Versions before 4.39.0 are vulnerable; upgrading to 4.39.0 or later mitigates the problem.

Risk and Exploitability

The CVSS score of 8.7 indicates high severity. No EPSS data is available, so the exploit probability is unknown at this time. The vulnerability is not listed in CISA’s KEV catalog. Attackers can trigger memory exhaustion by supplying a crafted image to any code path that imports ExifReader, so the attack vector is likely via a maliciously constructed image file. Successful exploitation would lead to denial of service, potentially impacting availability of services relying on ExifReader.

Generated by OpenCVE AI on May 19, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Ensure all deployments of ExifReader are upgraded to version 4.39.0 or newer.
  • If an upgrade is infeasible, isolate the image parsing logic in a restricted environment or sandbox to limit memory consumption.
  • Implement resource limits or monitor memory usage during image processing to detect and remediate excessive allocation before a crash occurs.

Generated by OpenCVE AI on May 19, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 19 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Mattiasw
Mattiasw exifreader
Vendors & Products Mattiasw
Mattiasw exifreader

Tue, 19 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description This affects versions of the package exifreader before 4.39.0. A crafted image containing an ICC mluc tag can set an attacker-controlled record count together with a zero record size. During parsing, ExifReader repeatedly processes the same record and appends entries to an array without sufficient bounds validation, causing excessive memory growth. In applications that parse attacker-supplied images, this may lead to denial of service through memory exhaustion.
Weaknesses CWE-1284
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Mattiasw Exifreader
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2026-05-19T05:00:04.103Z

Reserved: 2026-05-18T08:43:25.130Z

Link: CVE-2026-8813

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-19T07:16:30.193

Modified: 2026-05-19T07:16:30.193

Link: CVE-2026-8813

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-19T08:18:29Z

Weaknesses