CVE-2026-7580: Code Injection in Exiftool
CVE-2026-7580 is a medium-severity code injection vulnerability in Exiftool versions up to 13. 53. It affects the Process_mrld function in the lib/Image/ExifTool/GM. pm file, related to JPEG/QuickTime/MOV/MP4 processing. The vulnerability arises from manipulation of the -ee argument, allowing local attackers with low privileges to inject code. Exploitation requires local access. The issue is addressed by upgrading to Exiftool version 13. 54, which includes a patch identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. No known exploits are reported in the wild.
AI Analysis
Technical Summary
This vulnerability involves code injection through the Process_mrld function in Exiftool's handling of certain media file formats. The flaw is triggered by manipulating the -ee argument, enabling local attackers with low privileges to execute injected code. The vulnerability affects all versions from 13.0 through 13.53. The vendor has released version 13.54 containing a patch that mitigates this issue. The patch was applied to the source code with a note indicating the fix is precautionary. The CVSS 4.0 base score is 4.8, reflecting medium severity with local attack vector and low complexity.
Potential Impact
Successful exploitation allows local attackers with low privileges to inject and execute arbitrary code within the context of the Exiftool process. This could lead to unauthorized code execution on affected systems. However, exploitation requires local access and no user interaction. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Upgrade Exiftool to version 13.54 or later to apply the official patch (commit 5a8b6b6ead12b39e3f32f978a4efd0233facbb01) that addresses this vulnerability. Since the vulnerability requires local access, restricting local user permissions and access can reduce risk. Patch status is confirmed by the vendor's release of version 13.54.
CVE-2026-7580: Code Injection in Exiftool
Description
CVE-2026-7580 is a medium-severity code injection vulnerability in Exiftool versions up to 13. 53. It affects the Process_mrld function in the lib/Image/ExifTool/GM. pm file, related to JPEG/QuickTime/MOV/MP4 processing. The vulnerability arises from manipulation of the -ee argument, allowing local attackers with low privileges to inject code. Exploitation requires local access. The issue is addressed by upgrading to Exiftool version 13. 54, which includes a patch identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. No known exploits are reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability involves code injection through the Process_mrld function in Exiftool's handling of certain media file formats. The flaw is triggered by manipulating the -ee argument, enabling local attackers with low privileges to execute injected code. The vulnerability affects all versions from 13.0 through 13.53. The vendor has released version 13.54 containing a patch that mitigates this issue. The patch was applied to the source code with a note indicating the fix is precautionary. The CVSS 4.0 base score is 4.8, reflecting medium severity with local attack vector and low complexity.
Potential Impact
Successful exploitation allows local attackers with low privileges to inject and execute arbitrary code within the context of the Exiftool process. This could lead to unauthorized code execution on affected systems. However, exploitation requires local access and no user interaction. There are no reports of active exploitation in the wild.
Mitigation Recommendations
Upgrade Exiftool to version 13.54 or later to apply the official patch (commit 5a8b6b6ead12b39e3f32f978a4efd0233facbb01) that addresses this vulnerability. Since the vulnerability requires local access, restricting local user permissions and access can reduce risk. Patch status is confirmed by the vendor's release of version 13.54.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-05-01T06:20:12.971Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f500b7cbff5d86104519f7
Added to database: 5/1/2026, 7:36:23 PM
Last enriched: 5/1/2026, 7:51:20 PM
Last updated: 5/1/2026, 8:58:37 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.