HomeGpacCVE-2026-1415

CVE-2026-1415

MEDIUM
4.8CVSS
Published: 2026-01-26
Updated: 2026-01-28
AI Analysis

Description

A vulnerability was identified in GPAC up to 2.4.0. Affected is the function gf_media_export_webvtt_metadata of the file src/media_tools/media_export.c. The manipulation of the argument Name leads to null pointer dereference. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is af951b892dfbaaa38336ba2eba6d6a42c25810fd. To fix this issue, it is recommended to deploy a patch.

CVSS Metrics

Vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
local
Complexity
low
Privileges
low
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-404CWE-476CWE-476

Metadata

Primary Vendor
GPAC
Published
1/26/2026
Last Modified
1/28/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

gpac : gpac

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-1415 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com