Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-7580: Code Injection in Exiftool

0
Medium
VulnerabilityCVE-2026-7580cvecve-2026-7580
Published: Fri May 01 2026 (05/01/2026, 12:00:16 UTC)
Source: CVE Database V5
Product: Exiftool

Description

CVE-2026-7580 is a medium-severity code injection vulnerability in Exiftool versions up to 13. 53. It affects the Process_mrld function in the lib/Image/ExifTool/GM. pm file, related to JPEG/QuickTime/MOV/MP4 processing. The vulnerability arises from manipulation of the -ee argument, allowing local attackers with low privileges to inject code. Exploitation requires local access. The issue is addressed by upgrading to Exiftool version 13. 54, which includes a patch identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. No known exploits are reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/01/2026, 19:51:20 UTC

Technical Analysis

This vulnerability involves code injection through the Process_mrld function in Exiftool's handling of certain media file formats. The flaw is triggered by manipulating the -ee argument, enabling local attackers with low privileges to execute injected code. The vulnerability affects all versions from 13.0 through 13.53. The vendor has released version 13.54 containing a patch that mitigates this issue. The patch was applied to the source code with a note indicating the fix is precautionary. The CVSS 4.0 base score is 4.8, reflecting medium severity with local attack vector and low complexity.

Potential Impact

Successful exploitation allows local attackers with low privileges to inject and execute arbitrary code within the context of the Exiftool process. This could lead to unauthorized code execution on affected systems. However, exploitation requires local access and no user interaction. There are no reports of active exploitation in the wild.

Mitigation Recommendations

Upgrade Exiftool to version 13.54 or later to apply the official patch (commit 5a8b6b6ead12b39e3f32f978a4efd0233facbb01) that addresses this vulnerability. Since the vulnerability requires local access, restricting local user permissions and access can reduce risk. Patch status is confirmed by the vendor's release of version 13.54.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-05-01T06:20:12.971Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 69f500b7cbff5d86104519f7

Added to database: 5/1/2026, 7:36:23 PM

Last enriched: 5/1/2026, 7:51:20 PM

Last updated: 5/1/2026, 8:58:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses