Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28231: CWE-125: Out-of-bounds Read in bigcat88 pillow_heif

0
Medium
VulnerabilityCVE-2026-28231cvecve-2026-28231cwe-125cwe-190
Published: Fri Feb 27 2026 (02/27/2026, 20:13:45 UTC)
Source: CVE Database V5
Vendor/Project: bigcat88
Product: pillow_heif

Description

CVE-2026-28231 is a medium severity vulnerability in the pillow_heif Python library, used for handling HEIF images in Pillow. Versions prior to 1. 3. 0 suffer from an integer overflow in the encode path buffer validation, allowing attackers to bypass bounds checks by supplying large image dimensions. This triggers a heap out-of-bounds read, potentially leaking server memory contents into encoded images or causing process crashes. Exploitation requires no authentication or user interaction and occurs under default settings. The vulnerability impacts confidentiality and availability but does not affect integrity. No known exploits are reported in the wild. Upgrading to pillow_heif version 1. 3.

AI-Powered Analysis

AILast updated: 02/27/2026, 20:42:17 UTC

Technical Analysis

The vulnerability CVE-2026-28231 affects pillow_heif, a Python library that enables HEIF image processing as a plugin for the Pillow imaging library. The root cause is an integer overflow in the buffer validation logic within the encoding path implemented in the _pillow_heif.c source file. Specifically, when encoding images with very large dimensions, the integer overflow allows the calculation of buffer sizes to wrap around, bypassing bounds checks. This results in a heap out-of-bounds read during the encoding process. The out-of-bounds read can lead to two primary impacts: information disclosure, where heap memory contents may be leaked into the encoded image data, and denial of service, where the process crashes due to invalid memory access. The vulnerability is exploitable remotely without any authentication or user interaction, making it accessible in default configurations. The issue was addressed and fixed in pillow_heif version 1.3.0 by correcting the buffer validation to prevent integer overflow and enforce proper bounds checking. No public exploits or active exploitation campaigns have been reported as of the publication date.

Potential Impact

This vulnerability can have significant consequences for organizations that use pillow_heif for HEIF image processing, particularly in web services or applications that accept user-supplied images. The information disclosure risk could expose sensitive server memory contents, potentially leaking confidential data. The denial of service impact could disrupt services by crashing processes handling image encoding, affecting availability. Since exploitation requires no privileges or user interaction, attackers can remotely trigger the vulnerability, increasing the risk of automated attacks. However, the scope is limited to systems using vulnerable pillow_heif versions, which are primarily Python environments processing HEIF images. The medium CVSS score reflects moderate severity due to the combination of information leakage and service disruption without integrity compromise.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade pillow_heif to version 1.3.0 or later, where the integer overflow and bounds check issues are fixed. Additionally, implement input validation to restrict image dimensions and file sizes before processing to reduce the risk of triggering integer overflows. Employ runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing to detect out-of-bounds reads. Monitor application logs for crashes or anomalies related to image processing. If upgrading is not immediately feasible, consider isolating image processing workloads in sandboxed environments to limit impact from potential crashes or data leaks. Finally, maintain an inventory of software dependencies to quickly identify and patch vulnerable components.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-25T15:28:40.651Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a1fde732ffcdb8a26e412b

Added to database: 2/27/2026, 8:26:15 PM

Last enriched: 2/27/2026, 8:42:17 PM

Last updated: 2/27/2026, 9:43:23 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses