{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-7135","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-04-26T19:24:39.458Z","datePublished":"2026-04-27T15:15:11.686Z","dateUpdated":"2026-04-27T17:42:10.656Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-04-27T15:15:11.686Z"},"title":"GPAC MP4Box box_code_base.c elng_box_read out-of-bounds","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-125","lang":"en","description":"Out-of-Bounds Read"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"n/a","product":"GPAC","versions":[{"version":"26.03-DEV-rev105-g8f39a1eb3-master","status":"affected"}],"cpes":["cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"],"modules":["MP4Box"]}],"descriptions":[{"lang":"en","value":"A security flaw has been discovered in GPAC up to 26.03-DEV-rev105-g8f39a1eb3-master. Affected by this vulnerability is the function elng_box_read of the file src/isomedia/box_code_base.c of the component MP4Box. Performing a manipulation of the argument elng results in out-of-bounds read. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The patch is named cf6ac48c972eaaee2af270adc3f36615325deb3e. The affected component should be upgraded."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":4.8,"vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":5.3,"vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.3,"vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C"}}],"timeline":[{"time":"2026-04-26T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-04-26T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-04-26T21:29:52.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"Lucian-2333 (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/vuln/359734","name":"VDB-359734 | GPAC MP4Box box_code_base.c elng_box_read out-of-bounds","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/vuln/359734/cti","name":"VDB-359734 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/submit/800985","name":"Submit #800985 | gpac laster Memory Corruption","tags":["third-party-advisory"]},{"url":"https://github.com/gpac/gpac/issues/3516","tags":["exploit","issue-tracking"]},{"url":"https://github.com/gpac/gpac/commit/cf6ac48c972eaaee2af270adc3f36615325deb3e","tags":["patch"]},{"url":"https://github.com/gpac/gpac/releases/tag/abi-16.8","tags":["patch"]},{"url":"https://github.com/gpac/gpac/","tags":["product"]}],"tags":["x_open-source"]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-27T17:42:00.578501Z","id":"CVE-2026-7135","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-27T17:42:10.656Z"}}]}}