{"api_version":"1","generated_at":"2026-05-13T08:50:31+00:00","cve":"CVE-2026-3102","urls":{"html":"https://cve.report/CVE-2026-3102","api":"https://cve.report/api/cve/CVE-2026-3102.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-3102","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-3102"},"summary":{"title":"exiftool PNG File MacOS.pm SetMacOSTags os command injection","description":"A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.50 is capable of addressing this issue. Patch name: e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Upgrading the affected component is recommended.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-02-24 15:21:41","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-77","CWE-78","CWE-78 OS Command Injection","CWE-77 Command Injection"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"2.1","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"6.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"6.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","data":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"6.3","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","data":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C","data":{"baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"references":[{"url":"https://github.com/exiftool/exiftool/commit/e9609a9bcc0d32bd252a709a562fb822d6dd86f7","name":"https://github.com/exiftool/exiftool/commit/e9609a9bcc0d32bd252a709a562fb822d6dd86f7","refsource":"cna@vuldb.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.347528","name":"https://vuldb.com/?ctiid.347528","refsource":"cna@vuldb.com","tags":["Permissions Required"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.youtube.com/watch?v=akk0vmilfb4","name":"https://www.youtube.com/watch?v=akk0vmilfb4","refsource":"cna@vuldb.com","tags":["Exploit"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/exiftool/exiftool/releases/tag/13.50","name":"https://github.com/exiftool/exiftool/releases/tag/13.50","refsource":"cna@vuldb.com","tags":["Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?id.347528","name":"https://vuldb.com/?id.347528","refsource":"cna@vuldb.com","tags":["Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?submit.758146","name":"https://vuldb.com/?submit.758146","refsource":"cna@vuldb.com","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/exiftool/exiftool/","name":"https://github.com/exiftool/exiftool/","refsource":"cna@vuldb.com","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-3102","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3102","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.10","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.11","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.12","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.13","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.14","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.15","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.16","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.17","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.18","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.19","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.20","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.21","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.22","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.23","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.24","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.25","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.26","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.27","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.28","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.29","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.30","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.31","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.32","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.33","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.34","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.35","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.36","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.37","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.38","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.39","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.40","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.41","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.42","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.43","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.44","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.45","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.46","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.47","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.48","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"affected 13.49","platforms":[]},{"source":"CNA","vendor":"n/a","product":"exiftool","version":"unaffected 13.50","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-02-24T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-02-24T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-02-24T10:58:48.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"owl4444 (VulDB User)","lang":"en"}],"nvd_cpes":[{"cve_year":"2026","cve_id":"3102","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"apple","cpe5":"macos","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"3102","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"exiftool_project","cpe5":"exiftool","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-3102","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-02-27T19:00:50.001775Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-02-27T19:01:01.682Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"modules":["PNG File Parser"],"product":"exiftool","vendor":"n/a","versions":[{"status":"affected","version":"13.0"},{"status":"affected","version":"13.1"},{"status":"affected","version":"13.2"},{"status":"affected","version":"13.3"},{"status":"affected","version":"13.4"},{"status":"affected","version":"13.5"},{"status":"affected","version":"13.6"},{"status":"affected","version":"13.7"},{"status":"affected","version":"13.8"},{"status":"affected","version":"13.9"},{"status":"affected","version":"13.10"},{"status":"affected","version":"13.11"},{"status":"affected","version":"13.12"},{"status":"affected","version":"13.13"},{"status":"affected","version":"13.14"},{"status":"affected","version":"13.15"},{"status":"affected","version":"13.16"},{"status":"affected","version":"13.17"},{"status":"affected","version":"13.18"},{"status":"affected","version":"13.19"},{"status":"affected","version":"13.20"},{"status":"affected","version":"13.21"},{"status":"affected","version":"13.22"},{"status":"affected","version":"13.23"},{"status":"affected","version":"13.24"},{"status":"affected","version":"13.25"},{"status":"affected","version":"13.26"},{"status":"affected","version":"13.27"},{"status":"affected","version":"13.28"},{"status":"affected","version":"13.29"},{"status":"affected","version":"13.30"},{"status":"affected","version":"13.31"},{"status":"affected","version":"13.32"},{"status":"affected","version":"13.33"},{"status":"affected","version":"13.34"},{"status":"affected","version":"13.35"},{"status":"affected","version":"13.36"},{"status":"affected","version":"13.37"},{"status":"affected","version":"13.38"},{"status":"affected","version":"13.39"},{"status":"affected","version":"13.40"},{"status":"affected","version":"13.41"},{"status":"affected","version":"13.42"},{"status":"affected","version":"13.43"},{"status":"affected","version":"13.44"},{"status":"affected","version":"13.45"},{"status":"affected","version":"13.46"},{"status":"affected","version":"13.47"},{"status":"affected","version":"13.48"},{"status":"affected","version":"13.49"},{"status":"unaffected","version":"13.50"}]}],"credits":[{"lang":"en","type":"reporter","value":"owl4444 (VulDB User)"}],"descriptions":[{"lang":"en","value":"A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.50 is capable of addressing this issue. Patch name: e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Upgrading the affected component is recommended."}],"metrics":[{"cvssV4_0":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"cvssV3_0":{"baseScore":6.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"cvssV2_0":{"baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"OS Command Injection","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-77","description":"Command Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-02-24T14:32:13.272Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-347528 | exiftool PNG File MacOS.pm SetMacOSTags os command injection","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.347528"},{"name":"VDB-347528 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.347528"},{"name":"Submit #758146 | Exiftool 13.49 Arbitrary Code Execution","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.758146"},{"tags":["media-coverage"],"url":"https://www.youtube.com/watch?v=akk0vmilfb4"},{"tags":["patch"],"url":"https://github.com/exiftool/exiftool/commit/e9609a9bcc0d32bd252a709a562fb822d6dd86f7"},{"tags":["patch"],"url":"https://github.com/exiftool/exiftool/releases/tag/13.50"},{"tags":["product"],"url":"https://github.com/exiftool/exiftool/"}],"tags":["x_open-source"],"timeline":[{"lang":"en","time":"2026-02-24T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-02-24T01:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-02-24T10:58:48.000Z","value":"VulDB entry last update"}],"title":"exiftool PNG File MacOS.pm SetMacOSTags os command injection"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-3102","datePublished":"2026-02-24T14:32:13.272Z","dateReserved":"2026-02-24T09:53:41.654Z","dateUpdated":"2026-02-27T19:01:01.682Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-02-24 15:21:41","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-77","CWE-78","CWE-78 OS Command Injection","CWE-77 Command Injection"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.1,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":3.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:exiftool_project:exiftool:*:*:*:*:*:*:*:*","versionEndExcluding":"13.50","matchCriteriaId":"E1379709-89F5-4873-89F4-6439BCEBB943"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"3102","Ordinal":"1","Title":"exiftool PNG File MacOS.pm SetMacOSTags os command injection","CVE":"CVE-2026-3102","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"3102","Ordinal":"1","NoteData":"A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.50 is capable of addressing this issue. Patch name: e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Upgrading the affected component is recommended.","Type":"Description","Title":"exiftool PNG File MacOS.pm SetMacOSTags os command injection"}]}}}