๐Ÿ” CVE Alert

CVE-2026-33144

MEDIUM 5.8

GPAC MP4Box Heap Buffer Overflow Write in gf_xml_parse_bit_sequence_bs (NHML BS Parsing)

CVSS Score
5.8
EPSS Score
0.0%
EPSS Percentile
0th

GPAC is an open-source multimedia framework. Prior to commit 86b0e36, a heap-based buffer overflow (write) vulnerability was discovered in GPAC MP4Box. The vulnerability exists in the gf_xml_parse_bit_sequence_bs function in utils/xml_bin_custom.c when processing a crafted NHML file containing malicious <BS> (BitSequence) elements. An attacker can exploit this by providing a specially crafted NHML file, causing an out-of-bounds write on the heap. This issue has been via commit 86b0e36.

CWE CWE-787
Vendor gpac
Product gpac
Published Mar 20, 2026
Last Updated Mar 20, 2026
Stay Ahead of the Next One

Get instant alerts for gpac gpac

Be the first to know when new medium vulnerabilities affecting gpac gpac are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High

Affected Versions

gpac / gpac
< 86b0e36ea4c71402fbdaf7e13d73ba8841003e72

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gpac/gpac/security/advisories/GHSA-3jw5-9pmw-vmfg github.com: https://github.com/gpac/gpac/commit/86b0e36ea4c71402fbdaf7e13d73ba8841003e72