CVE-2026-4016Improper Restriction of Operations within the Bounds of a Memory Buffer in Gpac

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 96.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 12

Description

A security vulnerability has been detected in GPAC 26.03-DEV. Affected by this vulnerability is the function svgin_process of the file src/filters/load_svg.c of the component SVG Parser. The manipulation leads to out-of-bounds write. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 7618d7206cdeb3c28961dc97ab0ecabaff0c8af2. It is suggested to install a patch to address this issue.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages1 packages

debiandebian/gpac

🔴Vulnerability Details

2
OSV
CVE-2026-4016: A security vulnerability has been detected in GPAC 262026-03-12
GHSA
GHSA-8ppf-q6c4-54hr: A security vulnerability has been detected in GPAC 262026-03-12

📋Vendor Advisories

3
Debian
CVE-2026-4016: gpac - A security vulnerability has been detected in GPAC 26.03-DEV. Affected by this v...2026
Citrix
Citrix Security Bulletin CTX113815
Citrix
Citrix Security Bulletin CTX114028

🕵️Threat Intelligence

1
Wiz
CVE-2026-4016 Impact, Exploitability, and Mitigation Steps | Wiz