A vulnerability was determined in raysan5 raylib up to 909f040. Affected by this vulnerability is the function GenImageFontAtlas of the file src/rtext.c. Executing a manipulation can lead to heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. This patch is called 5a3391fdce046bc5473e52afbd835dd2dc127146. Applying a patch is advised to resolve this issue.
References
| Link | Resource |
|---|---|
| https://github.com/oneafter/1224/blob/main/hbf2 | Exploit |
| https://github.com/raysan5/raylib/ | |
| https://github.com/raysan5/raylib/commit/5a3391fdce046bc5473e52afbd835dd2dc127146 | Patch |
| https://github.com/raysan5/raylib/issues/5433 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/raysan5/raylib/pull/5450 | Issue Tracking |
| https://vuldb.com/?ctiid.341705 | Permissions Required VDB Entry |
| https://vuldb.com/?id.341705 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.733341 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.733342 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-01-18 05:16
Updated : 2026-02-23 09:16
NVD link : CVE-2025-15533
Mitre link : CVE-2025-15533
CVE.ORG link : CVE-2025-15533
JSON object : View
Products Affected
raylib
- raylib
