Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2889: Use After Free in CCExtractor

0
Medium
VulnerabilityCVE-2026-2889cvecve-2026-2889
Published: Sat Feb 21 2026 (02/21/2026, 22:02:11 UTC)
Source: CVE Database V5
Product: CCExtractor

Description

A vulnerability was detected in CCExtractor up to 0.96.5. Affected is the function processmp4 in the library src/lib_ccx/mp4.c. Performing a manipulation results in use after free. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 0.96.6 is able to address this issue. The patch is named fd7271bae238ccb3ae8a71304ea64f0886324925. You should upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/01/2026, 06:16:04 UTC

Technical Analysis

CVE-2026-2889 is a use-after-free vulnerability found in CCExtractor, an open-source tool used for extracting closed captions from video files. The vulnerability resides in the processmp4 function located in the source file src/lib_ccx/mp4.c. A use-after-free occurs when the program continues to use memory after it has been freed, leading to undefined behavior such as crashes, data corruption, or potential code execution. This flaw can be triggered by a local attacker with low privileges who can manipulate the input or environment to cause the program to access freed memory. The vulnerability does not require user interaction or elevated privileges, but it is limited to local access, meaning remote exploitation is not feasible without prior access. The CVSS 4.8 score reflects a medium severity, balancing the limited attack vector with the potential impact on confidentiality, integrity, and availability. The vulnerability was patched in CCExtractor version 0.96.6, with the fix committed under the hash fd7271bae238ccb3ae8a71304ea64f0886324925. No public exploits are currently known to be active in the wild, but the exploit code has been published, increasing the risk of future attacks. Organizations using affected versions should upgrade promptly to mitigate this risk.

Potential Impact

The use-after-free vulnerability in CCExtractor can lead to program crashes, denial of service, or potentially arbitrary code execution if exploited successfully. Since the attack requires local access with low privileges, the threat is primarily to environments where untrusted users have access to systems running vulnerable CCExtractor versions. This could include shared workstations, media processing servers, or development environments. Exploitation could allow an attacker to disrupt media processing workflows or escalate privileges if combined with other vulnerabilities. The impact on confidentiality is limited unless the attacker can leverage the flaw to execute arbitrary code and access sensitive data. Integrity and availability are more directly threatened due to possible crashes or malicious code execution. Given the medium CVSS score and lack of remote exploitability, the overall risk is moderate but should not be ignored, especially in environments with multiple users or untrusted local access.

Mitigation Recommendations

To mitigate CVE-2026-2889, organizations should upgrade CCExtractor to version 0.96.6 or later, which contains the official patch fixing the use-after-free vulnerability. In addition to upgrading, restrict local access to systems running CCExtractor to trusted users only, minimizing the risk of exploitation by unprivileged attackers. Employ system-level security controls such as mandatory access controls (e.g., SELinux, AppArmor) to limit the ability of processes to manipulate CCExtractor or its input files. Regularly audit and monitor systems for unusual crashes or behavior that might indicate exploitation attempts. If upgrading immediately is not feasible, consider isolating CCExtractor execution in sandboxed environments or containers to limit potential damage. Maintain up-to-date backups and incident response plans to quickly recover from any successful exploitation. Finally, keep abreast of any new exploit developments or patches related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-20T17:14:28.102Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699a2ee9be58cf853b52baf7

Added to database: 2/21/2026, 10:17:13 PM

Last enriched: 3/1/2026, 6:16:04 AM

Last updated: 4/8/2026, 10:51:35 AM

Views: 97

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses