HomeGpacCVE-2026-33144

CVE-2026-33144

MEDIUM
5.8CVSS
Published: 2026-03-20
Updated: 2026-04-14
AI Analysis

Description

GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-based buffer overflow (write) vulnerability was discovered in GPAC MP4Box. The vulnerability exists in the gf_xml_parse_bit_sequence_bs function in utils/xml_bin_custom.c when processing a crafted NHML file containing malicious <BS> (BitSequence) elements. An attacker can exploit this by providing a specially crafted NHML file, causing an out-of-bounds write on the heap. This issue has been via commit 86b0e36.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
Attack Vector
local
Complexity
high
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
low
Integrity
low
Availability
high
Weaknesses
CWE-787

Metadata

Primary Vendor
GPAC
Published
3/20/2026
Last Modified
4/14/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

gpac : gpac

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-33144 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com