๐Ÿ” CVE Alert

CVE-2025-15534

MEDIUM 5.3

raysan5 raylib rtext.c LoadFontData integer overflow

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue.

CWE CWE-190 CWE-189
Vendor raysan5
Product raylib
Published Jan 18, 2026
Last Updated Feb 23, 2026
Stay Ahead of the Next One

Get instant alerts for raysan5 raylib

Be the first to know when new medium vulnerabilities affecting raysan5 raylib are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

raysan5 / raylib
909f040

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/?id.341706 vuldb.com: https://vuldb.com/?ctiid.341706 vuldb.com: https://vuldb.com/?submit.733343 github.com: https://github.com/raysan5/raylib/issues/5436 github.com: https://github.com/raysan5/raylib/pull/5450 github.com: https://github.com/oneafter/1224/blob/main/segv1 github.com: https://github.com/raysan5/raylib/commit/5a3391fdce046bc5473e52afbd835dd2dc127146 github.com: https://github.com/raysan5/raylib/

Credits

๐Ÿ” Oneafter (VulDB User)