{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-3102","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-02-24T09:53:41.654Z","datePublished":"2026-02-24T14:32:13.272Z","dateUpdated":"2026-02-27T19:01:01.682Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T14:32:13.272Z"},"title":"exiftool PNG File MacOS.pm SetMacOSTags os command injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-78","lang":"en","description":"OS Command Injection"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-77","lang":"en","description":"Command Injection"}]}],"affected":[{"vendor":"n/a","product":"exiftool","versions":[{"version":"13.0","status":"affected"},{"version":"13.1","status":"affected"},{"version":"13.2","status":"affected"},{"version":"13.3","status":"affected"},{"version":"13.4","status":"affected"},{"version":"13.5","status":"affected"},{"version":"13.6","status":"affected"},{"version":"13.7","status":"affected"},{"version":"13.8","status":"affected"},{"version":"13.9","status":"affected"},{"version":"13.10","status":"affected"},{"version":"13.11","status":"affected"},{"version":"13.12","status":"affected"},{"version":"13.13","status":"affected"},{"version":"13.14","status":"affected"},{"version":"13.15","status":"affected"},{"version":"13.16","status":"affected"},{"version":"13.17","status":"affected"},{"version":"13.18","status":"affected"},{"version":"13.19","status":"affected"},{"version":"13.20","status":"affected"},{"version":"13.21","status":"affected"},{"version":"13.22","status":"affected"},{"version":"13.23","status":"affected"},{"version":"13.24","status":"affected"},{"version":"13.25","status":"affected"},{"version":"13.26","status":"affected"},{"version":"13.27","status":"affected"},{"version":"13.28","status":"affected"},{"version":"13.29","status":"affected"},{"version":"13.30","status":"affected"},{"version":"13.31","status":"affected"},{"version":"13.32","status":"affected"},{"version":"13.33","status":"affected"},{"version":"13.34","status":"affected"},{"version":"13.35","status":"affected"},{"version":"13.36","status":"affected"},{"version":"13.37","status":"affected"},{"version":"13.38","status":"affected"},{"version":"13.39","status":"affected"},{"version":"13.40","status":"affected"},{"version":"13.41","status":"affected"},{"version":"13.42","status":"affected"},{"version":"13.43","status":"affected"},{"version":"13.44","status":"affected"},{"version":"13.45","status":"affected"},{"version":"13.46","status":"affected"},{"version":"13.47","status":"affected"},{"version":"13.48","status":"affected"},{"version":"13.49","status":"affected"},{"version":"13.50","status":"unaffected"}],"modules":["PNG File Parser"]}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.50 is capable of addressing this issue. Patch name: e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Upgrading the affected component is recommended."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.3,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":6.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":6.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-02-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-02-24T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-02-24T10:58:48.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"owl4444 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.347528","name":"VDB-347528 | exiftool PNG File MacOS.pm SetMacOSTags os command injection","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.347528","name":"VDB-347528 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.758146","name":"Submit #758146 | Exiftool 13.49 Arbitrary Code Execution","tags":["third-party-advisory"]},{"url":"https://www.youtube.com/watch?v=akk0vmilfb4","tags":["media-coverage"]},{"url":"https://github.com/exiftool/exiftool/commit/e9609a9bcc0d32bd252a709a562fb822d6dd86f7","tags":["patch"]},{"url":"https://github.com/exiftool/exiftool/releases/tag/13.50","tags":["patch"]},{"url":"https://github.com/exiftool/exiftool/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-27T19:00:50.001775Z","id":"CVE-2026-3102","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-27T19:01:01.682Z"}}]}}