Ad

CVE-2026-33144

MEDIUM CVSS 3.1: 5.8 EPSS 0.02%
Updated Mar 23, 2026
Gpac
Parameter Value
CVSS 5.8 (MEDIUM)
Type CWE-787 (Out-of-bounds Write)
Vendor Gpac
Public PoC No

GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-based buffer overflow (write) vulnerability was discovered in GPAC MP4Box. The vulnerability exists in the gf_xml_parse_bit_sequence_bs function in utils/xml_bin_custom.c when processing a crafted NHML file containing malicious <BS> (BitSequence) elements.

An attacker can exploit this by providing a specially crafted NHML file, causing an out-of-bounds write on the heap. This issue has been via commit 86b0e36.

Attack Parameters

Attack Vector
Local
Requires local access
Attack Complexity
High
Difficult to exploit
Privileges Required
None
No privileges needed
User Interaction
Required
User action required

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
Low
Partial data modification
Availability
High
Complete denial of service

CVSS Vector v3.1

Weakness Type (CWE)

Related Vulnerabilities