A vulnerability has been found in Mapnik up to 4.2.0. This vulnerability affects the function mapnik::detail::mod<...>::operator of the file src/value.cpp. The manipulation leads to divide by zero. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/mapnik/mapnik/ | Product |
| https://github.com/mapnik/mapnik/issues/4545 | Exploit Issue Tracking |
| https://github.com/oneafter/1219/blob/main/repro | Exploit |
| https://vuldb.com/?ctiid.344502 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344502 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.743386 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2026-02-07 22:16
Updated : 2026-02-28 00:27
NVD link : CVE-2025-15564
Mitre link : CVE-2025-15564
CVE.ORG link : CVE-2025-15564
JSON object : View
Products Affected
mapnik
- mapnik
