Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 10 Apr 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:libraw:libraw:0.22.0:*:*:*:*:*:*:* |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Libraw
Libraw libraw |
|
| Vendors & Products |
Libraw
Libraw libraw |
Wed, 08 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | LibRaw: LibRaw: Arbitrary code execution via specially crafted image file | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 07 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A heap-based buffer overflow vulnerability exists in the x3f_thumb_loader functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability. | |
| Weaknesses | CWE-190 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2026-04-08T03:55:49.049Z
Reserved: 2026-01-26T13:34:18.923Z
Link: CVE-2026-20889
Updated: 2026-04-07T16:23:21.141Z
Status : Analyzed
Published: 2026-04-07T15:17:35.300
Modified: 2026-04-10T20:51:04.523
Link: CVE-2026-20889
OpenCVE Enrichment
Updated: 2026-04-13T14:27:11Z