A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.50 is capable of addressing this issue. Patch name: e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Upgrading the affected component is recommended.
References
| Link | Resource |
|---|---|
| https://github.com/exiftool/exiftool/ | Product |
| https://github.com/exiftool/exiftool/commit/e9609a9bcc0d32bd252a709a562fb822d6dd86f7 | Patch |
| https://github.com/exiftool/exiftool/releases/tag/13.50 | Release Notes |
| https://vuldb.com/?ctiid.347528 | Permissions Required |
| https://vuldb.com/?id.347528 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.758146 | Exploit Third Party Advisory VDB Entry |
| https://www.youtube.com/watch?v=akk0vmilfb4 | Exploit |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-24 15:21
Updated : 2026-02-26 20:09
NVD link : CVE-2026-3102
Mitre link : CVE-2026-3102
CVE.ORG link : CVE-2026-3102
JSON object : View
Products Affected
apple
- macos
exiftool_project
- exiftool
