Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1418: Out-of-bounds Write in GPAC

0
Medium
VulnerabilityCVE-2026-1418cvecve-2026-1418
Published: Mon Jan 26 2026 (01/26/2026, 04:02:06 UTC)
Source: CVE Database V5
Product: GPAC

Description

A security vulnerability has been detected in GPAC up to 2.4.0. This affects the function gf_text_import_srt_bifs of the file src/scene_manager/text_to_bifs.c of the component SRT Subtitle Import. Such manipulation leads to out-of-bounds write. The attack needs to be performed locally. The exploit has been disclosed publicly and may be used. The name of the patch is 10c73b82cf0e367383d091db38566a0e4fe71772. It is best practice to apply a patch to resolve this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:27:36 UTC

Technical Analysis

CVE-2026-1418 is an out-of-bounds write vulnerability found in the GPAC multimedia framework, affecting versions 2.0 through 2.4.0. The vulnerability exists in the function gf_text_import_srt_bifs located in src/scene_manager/text_to_bifs.c, which handles the import of SRT subtitle files. Specifically, improper handling of subtitle data allows an attacker to write outside the bounds of allocated memory, potentially corrupting adjacent memory regions. This can lead to unpredictable behavior including application crashes or local privilege escalation if exploited effectively. The attack vector is local, requiring the attacker to have limited privileges on the system where GPAC is installed. No user interaction is needed once local access is obtained. The vulnerability has been publicly disclosed, increasing the risk of exploitation, although no active exploits have been reported in the wild. The patch addressing this vulnerability is identified by commit 10c73b82cf0e367383d091db38566a0e4fe71772 and should be applied promptly. The CVSS v4.0 score is 4.8, reflecting a medium severity level due to the local attack vector and limited scope of impact. The vulnerability does not affect confidentiality directly but can impact integrity and availability through memory corruption.

Potential Impact

The primary impact of CVE-2026-1418 is on the integrity and availability of systems running vulnerable versions of GPAC. Successful exploitation can cause application crashes, leading to denial of service conditions. In some scenarios, the out-of-bounds write could be leveraged for local privilege escalation, allowing attackers to gain higher system privileges and potentially compromise the host. Since the attack requires local access, the threat is limited to environments where untrusted users have some level of system access. Organizations using GPAC in multimedia processing, streaming, or content delivery pipelines may face disruptions or security breaches if this vulnerability is exploited. The absence of known exploits in the wild reduces immediate risk but the public disclosure increases the likelihood of future exploit development. Systems running GPAC on multi-user or shared environments are at higher risk. The vulnerability does not affect remote systems directly, limiting its impact on large-scale network attacks.

Mitigation Recommendations

To mitigate CVE-2026-1418, organizations should immediately apply the official patch identified by commit 10c73b82cf0e367383d091db38566a0e4fe71772 to all GPAC installations running versions 2.0 through 2.4.0. If patching is not immediately feasible, restrict local access to systems running GPAC to trusted users only, minimizing the risk of local exploitation. Employ strict access controls and monitoring on systems where GPAC is deployed, especially in multi-user environments. Consider running GPAC processes with the least privileges necessary to limit the impact of potential exploitation. Regularly audit and update multimedia processing software to the latest versions. Additionally, implement host-based intrusion detection systems (HIDS) to detect abnormal application behavior or crashes related to subtitle processing. Educate system administrators about the risks of local vulnerabilities in multimedia frameworks and the importance of timely patch management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-25T09:58:18.674Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6976eba84623b1157c5a7de2

Added to database: 1/26/2026, 4:20:56 AM

Last enriched: 2/23/2026, 10:27:36 PM

Last updated: 3/25/2026, 2:38:55 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses