Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC

0
Medium
VulnerabilityCVE-2025-15536cvecve-2025-15536
Published: Sun Jan 18 2026 (01/18/2026, 09:02:12 UTC)
Source: CVE Database V5
Vendor/Project: BYVoid
Product: OpenCC

Description

A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.

AI-Powered Analysis

AILast updated: 01/25/2026, 19:47:19 UTC

Technical Analysis

CVE-2025-15536 identifies a heap-based buffer overflow vulnerability in the opencc::MaxMatchSegmentation function within BYVoid OpenCC versions 1.1.0 through 1.1.9. OpenCC is an open-source library widely used for converting between Traditional and Simplified Chinese characters, often integrated into software requiring Chinese language processing. The vulnerability arises from improper handling of input data in the MaxMatchSegmentation.cpp source file, leading to heap memory corruption when processing certain inputs. This flaw can be exploited by a local attacker with limited privileges (PR:L) without requiring user interaction (UI:N). The attacker can manipulate the vulnerable function to overflow a heap buffer, potentially causing application crashes or enabling arbitrary code execution depending on the environment and exploit sophistication. The CVSS 4.8 score indicates a medium severity with local attack vector and low complexity, but with partial impacts on confidentiality, integrity, and availability. The exploit code has been publicly disclosed, increasing the risk of exploitation despite no current reports of active attacks. The recommended remediation is to apply the patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec, which corrects the buffer handling in the affected function. Organizations relying on OpenCC for text conversion should prioritize patching to prevent potential exploitation.

Potential Impact

For European organizations, the impact of CVE-2025-15536 depends largely on the use of OpenCC within their software stacks. Entities involved in software development, localization, or content processing that handle Chinese language data may integrate OpenCC and thus be vulnerable. Successful exploitation could lead to local denial of service or privilege escalation if attackers leverage the heap overflow for code execution. Although the attack requires local access, compromised internal systems or insider threats could exploit this vulnerability to disrupt services or gain unauthorized control. The partial impact on confidentiality, integrity, and availability means sensitive data could be exposed or altered, and system stability affected. Given the public availability of exploit code, the risk of exploitation may increase over time, especially in environments where patching is delayed. The vulnerability is less likely to affect organizations that do not use OpenCC or do not process Chinese text locally. However, given the global nature of software supply chains, indirect exposure through third-party software embedding OpenCC is possible.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate CVE-2025-15536: 1) Identify all instances of BYVoid OpenCC in their environments, including embedded uses in third-party applications. 2) Apply the official patch corresponding to commit 345c9a50ab07018f1b4439776bad78a0d40778ec immediately to all affected versions (1.1.0 through 1.1.9). 3) Restrict local access to systems running OpenCC to trusted users only, minimizing the risk of local exploitation. 4) Monitor logs and system behavior for signs of heap corruption or abnormal crashes related to OpenCC processes. 5) Incorporate OpenCC version checks into software supply chain audits to ensure no vulnerable versions are deployed. 6) Educate internal developers and IT staff about the vulnerability and the importance of timely patching. 7) Consider sandboxing or isolating applications that use OpenCC to limit the impact of potential exploitation. 8) Maintain up-to-date backups and incident response plans to quickly recover from any exploitation attempts. These steps go beyond generic advice by focusing on local access control, supply chain awareness, and proactive monitoring specific to OpenCC usage.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T16:27:11.665Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ca3d1d302b072d9b4cb87

Added to database: 1/18/2026, 9:11:45 AM

Last enriched: 1/25/2026, 7:47:19 PM

Last updated: 2/7/2026, 6:04:25 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats