CVE-2021-26825Integer Overflow or Wraparound in Godot Engine

Severity
7.8HIGHNVD
EPSS
0.6%
top 29.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8
Latest updateJun 18

Description

An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

Debiangodotengine/godot< 3.5.1-stable-1

Patches

🔴Vulnerability Details

4
OSV
godot vulnerabilities2025-06-18
GHSA
GHSA-gp7f-w798-4853: An integer overflow issue exists in Godot Engine up to v32022-05-24
CVEList
CVE-2021-26825: An integer overflow issue exists in Godot Engine up to v32021-02-08
OSV
CVE-2021-26825: An integer overflow issue exists in Godot Engine up to v32021-02-08

📋Vendor Advisories

2
Ubuntu
Godot Engine vulnerabilities2025-06-18
Debian
CVE-2021-26825: godot - An integer overflow issue exists in Godot Engine up to v3.2 that can be triggere...2021
CVE-2021-26825 — Integer Overflow or Wraparound | cvebase