Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-33768: n/a

0
Critical
VulnerabilityCVE-2024-33768cvecve-2024-33768
Published: Wed May 01 2024 (05/01/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

lunasvg v2.3.9 was discovered to contain a segmentation violation via the component composition_solid_source_over.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:00:30 UTC

Technical Analysis

CVE-2024-33768 is a critical security vulnerability identified in lunasvg version 2.3.9, a library used for rendering SVG (Scalable Vector Graphics) images. The flaw is a segmentation violation triggered within the component composition_solid_source_over, which is part of the image composition process. This segmentation fault is classified under CWE-653, indicating an incorrect control flow leading to memory corruption. The vulnerability allows remote attackers to cause a denial of service by crashing the application or potentially execute arbitrary code, as the segmentation violation can be exploited to manipulate program execution. The CVSS v3.1 score of 9.8 reflects the vulnerability's high severity, with attack vector being network-based (AV:N), requiring no privileges (PR:N), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No patches or fixes have been published at the time of disclosure, and no active exploits have been reported in the wild. The vulnerability poses a significant risk to any software or services that incorporate lunasvg v2.3.9 for SVG processing, especially those exposed to untrusted input or network traffic. Due to the critical nature of the flaw, attackers could leverage this vulnerability to compromise systems, disrupt services, or escalate privileges if combined with other vulnerabilities.

Potential Impact

The impact of CVE-2024-33768 is substantial for organizations worldwide that rely on lunasvg v2.3.9 for SVG rendering or processing. Exploitation can lead to complete system compromise, including unauthorized disclosure of sensitive information, data manipulation, and service disruption. Since the vulnerability requires no authentication or user interaction and can be triggered remotely, it increases the attack surface significantly. Organizations running web services, graphic design tools, or any applications processing SVG files with lunasvg are at risk of denial of service or remote code execution attacks. This can result in operational downtime, loss of customer trust, regulatory penalties, and financial losses. The lack of an available patch further exacerbates the risk, necessitating immediate defensive measures. The vulnerability also poses a threat to supply chains that incorporate lunasvg in their software stacks, potentially enabling widespread exploitation if weaponized.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations to reduce risk. First, restrict or block untrusted SVG input from external sources, especially over network interfaces exposed to the internet. Employ input validation and sanitization to detect and reject malformed or suspicious SVG files. Use application-layer firewalls or intrusion detection systems to monitor and block attempts to exploit the segmentation violation. Consider isolating or sandboxing processes that utilize lunasvg to limit the impact of potential crashes or code execution. Review and update incident response plans to include detection and mitigation of SVG-related attacks. Engage with vendors or maintainers of lunasvg to track patch releases and apply updates promptly. Where feasible, temporarily replace lunasvg with alternative SVG rendering libraries that do not contain this vulnerability. Conduct thorough security testing and code audits of applications integrating lunasvg to identify and remediate related risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c45b7ef31ef0b561c96

Added to database: 2/25/2026, 9:40:21 PM

Last enriched: 2/28/2026, 3:00:30 AM

Last updated: 4/12/2026, 7:41:02 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses