{"api_version":"1","generated_at":"2026-04-07T22:30:59+00:00","cve":"CVE-2026-5318","urls":{"html":"https://cve.report/CVE-2026-5318","api":"https://cve.report/api/cve/CVE-2026-5318.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-5318","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-5318"},"summary":{"title":"LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write","description":"A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-04-02 03:16:07","updated_at":"2026-04-07 12:16:21"},"problem_types":["CWE-119","CWE-787","CWE-787 Out-of-bounds Write","CWE-119 Memory Corruption"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"5.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Secondary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","data":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","data":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C","data":{"baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"references":[{"url":"https://github.com/LibRaw/LibRaw/issues/794","name":"https://github.com/LibRaw/LibRaw/issues/794","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/354650","name":"https://vuldb.com/vuln/354650","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/LibRaw/LibRaw/","name":"https://github.com/LibRaw/LibRaw/","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/LibRaw/LibRaw/commit/a6734e867b19d75367c05f872ac26322464e3995","name":"https://github.com/LibRaw/LibRaw/commit/a6734e867b19d75367c05f872ac26322464e3995","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/LibRaw/LibRaw/issues/794#issuecomment-4065342499","name":"https://github.com/LibRaw/LibRaw/issues/794#issuecomment-4065342499","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/submit/780538","name":"https://vuldb.com/submit/780538","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/354650/cti","name":"https://vuldb.com/vuln/354650/cti","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/LibRaw/LibRaw/releases/tag/0.22.1","name":"https://github.com/LibRaw/LibRaw/releases/tag/0.22.1","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/biniamf/pocs/tree/main/libraw_lljpeg","name":"https://github.com/biniamf/pocs/tree/main/libraw_lljpeg","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-5318","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-5318","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.10","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.11","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.12","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.13","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.14","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.15","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.16","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.17","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.18","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.19","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.20","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.21","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"affected 0.22.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"LibRaw","version":"unaffected 0.22.1","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-04-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-04-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-04-07T13:31:44.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"biniam (VulDB User)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"5318","cve":"CVE-2026-5318","epss":"0.000140000","percentile":"0.026710000","score_date":"2026-04-06","updated_at":"2026-04-07 00:04:50"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-5318","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-04-03T19:48:49.260199Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-04-03T19:48:59.933Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"cpes":["cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*"],"modules":["JPEG DHT Parser"],"product":"LibRaw","vendor":"n/a","versions":[{"status":"affected","version":"0.1"},{"status":"affected","version":"0.2"},{"status":"affected","version":"0.3"},{"status":"affected","version":"0.4"},{"status":"affected","version":"0.5"},{"status":"affected","version":"0.6"},{"status":"affected","version":"0.7"},{"status":"affected","version":"0.8"},{"status":"affected","version":"0.9"},{"status":"affected","version":"0.10"},{"status":"affected","version":"0.11"},{"status":"affected","version":"0.12"},{"status":"affected","version":"0.13"},{"status":"affected","version":"0.14"},{"status":"affected","version":"0.15"},{"status":"affected","version":"0.16"},{"status":"affected","version":"0.17"},{"status":"affected","version":"0.18"},{"status":"affected","version":"0.19"},{"status":"affected","version":"0.20"},{"status":"affected","version":"0.21"},{"status":"affected","version":"0.22.0"},{"status":"unaffected","version":"0.22.1"}]}],"credits":[{"lang":"en","type":"reporter","value":"biniam (VulDB User)"}],"descriptions":[{"lang":"en","value":"A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component."}],"metrics":[{"cvssV4_0":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"cvssV3_0":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"cvssV2_0":{"baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"Out-of-bounds Write","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-119","description":"Memory Corruption","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-07T11:26:57.754Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-354650 | LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/vuln/354650"},{"name":"VDB-354650 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/vuln/354650/cti"},{"name":"Submit #780538 | LibRaw 0.22.0 Out-of-bounds Write","tags":["third-party-advisory"],"url":"https://vuldb.com/submit/780538"},{"tags":["issue-tracking"],"url":"https://github.com/LibRaw/LibRaw/issues/794"},{"tags":["issue-tracking"],"url":"https://github.com/LibRaw/LibRaw/issues/794#issuecomment-4065342499"},{"tags":["exploit"],"url":"https://github.com/biniamf/pocs/tree/main/libraw_lljpeg"},{"tags":["patch"],"url":"https://github.com/LibRaw/LibRaw/commit/a6734e867b19d75367c05f872ac26322464e3995"},{"tags":["patch"],"url":"https://github.com/LibRaw/LibRaw/releases/tag/0.22.1"},{"tags":["product"],"url":"https://github.com/LibRaw/LibRaw/"}],"tags":["x_open-source"],"timeline":[{"lang":"en","time":"2026-04-01T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-04-01T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-04-07T13:31:44.000Z","value":"VulDB entry last update"}],"title":"LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-5318","datePublished":"2026-04-02T01:45:12.421Z","dateReserved":"2026-04-01T12:43:19.844Z","dateUpdated":"2026-04-07T11:26:57.754Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-02 03:16:07","lastModifiedDate":"2026-04-07 12:16:21","problem_types":["CWE-119","CWE-787","CWE-787 Out-of-bounds Write","CWE-119 Memory Corruption"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"5318","Ordinal":"1","Title":"LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write","CVE":"CVE-2026-5318","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"5318","Ordinal":"1","NoteData":"A weakness has been identified in LibRaw up to 0.22.0. This impacts the function HuffTable::initval of the file src/decompressors/losslessjpeg.cpp of the component JPEG DHT Parser. This manipulation of the argument bits[] causes out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 0.22.1 will fix this issue. Patch name: a6734e867b19d75367c05f872ac26322464e3995. It is advisable to upgrade the affected component.","Type":"Description","Title":"LibRaw JPEG DHT losslessjpeg.cpp initval out-of-bounds write"}]}}}