Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC

0
Medium
VulnerabilityCVE-2025-15536cvecve-2025-15536
Published: Sun Jan 18 2026 (01/18/2026, 09:02:12 UTC)
Source: CVE Database V5
Vendor/Project: BYVoid
Product: OpenCC

Description

A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:42:57 UTC

Technical Analysis

CVE-2025-15536 is a heap-based buffer overflow vulnerability identified in the opencc::MaxMatchSegmentation function within the src/MaxMatchSegmentation.cpp file of BYVoid OpenCC versions 1.1.0 through 1.1.9. OpenCC is an open-source library widely used for Chinese text conversion and segmentation. The vulnerability arises from improper handling of input data that leads to writing beyond allocated heap memory boundaries, causing memory corruption. This flaw can be exploited by a local attacker with limited privileges (PR:L) without requiring user interaction (UI:N) or elevated authentication (AT:N). The attacker can manipulate inputs to trigger the overflow, potentially resulting in denial of service (application crashes) or, in some cases, arbitrary code execution if further exploitation is possible. The vulnerability has a CVSS 4.8 score, reflecting medium severity due to its local attack vector and limited scope of impact. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec addresses this issue by correcting the buffer management in the affected function. Given OpenCC's role in language processing, this vulnerability primarily threatens systems running OpenCC locally, especially in environments processing Chinese text data.

Potential Impact

The primary impact of CVE-2025-15536 is the potential for local attackers to cause heap memory corruption, which can lead to application crashes or potentially arbitrary code execution. For organizations, this could result in denial of service conditions on systems running OpenCC, disrupting services that rely on text conversion or segmentation. In scenarios where attackers can escalate privileges or execute code, this could lead to broader system compromise. Since the vulnerability requires local access with some privileges, the risk is mitigated somewhat by access controls, but insider threats or compromised accounts could exploit it. The public availability of exploit code increases the likelihood of exploitation attempts. Organizations using OpenCC in critical language processing pipelines, especially in sectors like government, finance, or telecommunications in East Asia, could face operational disruptions or data integrity issues if exploited. The vulnerability does not affect remote attackers directly, limiting its impact scope but still posing a significant risk in multi-user or shared environments.

Mitigation Recommendations

To mitigate CVE-2025-15536, organizations should immediately apply the official patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec to all affected OpenCC installations. Beyond patching, restrict local access to systems running OpenCC to trusted users only, employing strict access controls and monitoring for unusual local activity. Employ application whitelisting and runtime protections to detect and prevent exploitation attempts. Conduct regular code audits and fuzz testing on text processing components to identify similar vulnerabilities proactively. Where possible, run OpenCC processes with the least privileges necessary to limit the impact of potential exploitation. Additionally, maintain up-to-date backups and incident response plans to recover quickly from any exploitation-induced disruptions. Network segmentation can also help isolate vulnerable systems from critical infrastructure. Finally, educate local users and administrators about the risks of executing untrusted code or scripts that might trigger the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T16:27:11.665Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696ca3d1d302b072d9b4cb87

Added to database: 1/18/2026, 9:11:45 AM

Last enriched: 2/23/2026, 10:42:57 PM

Last updated: 3/25/2026, 10:43:29 AM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses