{"api_version":"1","generated_at":"2026-05-13T08:50:30+00:00","cve":"CVE-2026-7580","urls":{"html":"https://cve.report/CVE-2026-7580","api":"https://cve.report/api/cve/CVE-2026-7580.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-7580","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-7580"},"summary":{"title":"Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection","description":"A vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: \"[J]ust to be safe, probably never happen\".","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-05-01 12:16:17","updated_at":"2026-05-01 15:26:24"},"problem_types":["CWE-74","CWE-94","CWE-94 Code Injection","CWE-74 Injection"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"1.9","severity":"LOW","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"4.8","severity":"MEDIUM","vector":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":4.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Primary","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","data":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","data":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"4.3","severity":"","vector":"AV:L/AC:L/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P","baseScore":4.3,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"4.3","severity":"","vector":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C","data":{"baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"references":[{"url":"https://vuldb.com/vuln/360421","name":"https://vuldb.com/vuln/360421","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/exiftool/exiftool/commit/5a8b6b6ead12b39e3f32f978a4efd0233facbb01#diff-5a95c56c6f98f0aa538233fd81bb9967154f3e9ebd4126a98dfb126c4c5629a4","name":"https://github.com/exiftool/exiftool/commit/5a8b6b6ead12b39e3f32f978a4efd0233facbb01#diff-5a95c56c6f98f0aa538233fd81bb9967154f3e9ebd4126a98dfb126c4c5629a4","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://youtu.be/WktMPapQxlM","name":"https://youtu.be/WktMPapQxlM","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/exiftool/exiftool/releases/tag/13.54","name":"https://github.com/exiftool/exiftool/releases/tag/13.54","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/exiftool/exiftool/commit/5a8b6b6ead12b39e3f32f978a4efd0233facbb01","name":"https://github.com/exiftool/exiftool/commit/5a8b6b6ead12b39e3f32f978a4efd0233facbb01","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/vuln/360421/cti","name":"https://vuldb.com/vuln/360421/cti","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/submit/800049","name":"https://vuldb.com/submit/800049","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/exiftool/exiftool/","name":"https://github.com/exiftool/exiftool/","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-7580","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-7580","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.10","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.11","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.12","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.13","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.14","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.15","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.16","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.17","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.18","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.19","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.20","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.21","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.22","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.23","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.24","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.25","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.26","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.27","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.28","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.29","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.30","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.31","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.32","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.33","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.34","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.35","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.36","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.37","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.38","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.39","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.40","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.41","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.42","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.43","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.44","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.45","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.46","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.47","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.48","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.49","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.50","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.51","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.52","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"affected 13.53","platforms":[]},{"source":"CNA","vendor":"n/a","product":"Exiftool","version":"unaffected 13.54","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-05-01T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-05-01T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-05-01T08:25:50.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"ilyass-armadin (VulDB User)","lang":"en"},{"source":"CNA","value":"VulDB CNA Team","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"7580","cve":"CVE-2026-7580","epss":"0.000070000","percentile":"0.006080000","score_date":"2026-05-05","updated_at":"2026-05-06 00:08:09"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"modules":["JPEG/QuickTime/MOV/MP4"],"product":"Exiftool","vendor":"n/a","versions":[{"status":"affected","version":"13.0"},{"status":"affected","version":"13.1"},{"status":"affected","version":"13.2"},{"status":"affected","version":"13.3"},{"status":"affected","version":"13.4"},{"status":"affected","version":"13.5"},{"status":"affected","version":"13.6"},{"status":"affected","version":"13.7"},{"status":"affected","version":"13.8"},{"status":"affected","version":"13.9"},{"status":"affected","version":"13.10"},{"status":"affected","version":"13.11"},{"status":"affected","version":"13.12"},{"status":"affected","version":"13.13"},{"status":"affected","version":"13.14"},{"status":"affected","version":"13.15"},{"status":"affected","version":"13.16"},{"status":"affected","version":"13.17"},{"status":"affected","version":"13.18"},{"status":"affected","version":"13.19"},{"status":"affected","version":"13.20"},{"status":"affected","version":"13.21"},{"status":"affected","version":"13.22"},{"status":"affected","version":"13.23"},{"status":"affected","version":"13.24"},{"status":"affected","version":"13.25"},{"status":"affected","version":"13.26"},{"status":"affected","version":"13.27"},{"status":"affected","version":"13.28"},{"status":"affected","version":"13.29"},{"status":"affected","version":"13.30"},{"status":"affected","version":"13.31"},{"status":"affected","version":"13.32"},{"status":"affected","version":"13.33"},{"status":"affected","version":"13.34"},{"status":"affected","version":"13.35"},{"status":"affected","version":"13.36"},{"status":"affected","version":"13.37"},{"status":"affected","version":"13.38"},{"status":"affected","version":"13.39"},{"status":"affected","version":"13.40"},{"status":"affected","version":"13.41"},{"status":"affected","version":"13.42"},{"status":"affected","version":"13.43"},{"status":"affected","version":"13.44"},{"status":"affected","version":"13.45"},{"status":"affected","version":"13.46"},{"status":"affected","version":"13.47"},{"status":"affected","version":"13.48"},{"status":"affected","version":"13.49"},{"status":"affected","version":"13.50"},{"status":"affected","version":"13.51"},{"status":"affected","version":"13.52"},{"status":"affected","version":"13.53"},{"status":"unaffected","version":"13.54"}]}],"credits":[{"lang":"en","type":"reporter","value":"ilyass-armadin (VulDB User)"},{"lang":"en","type":"coordinator","value":"VulDB CNA Team"}],"descriptions":[{"lang":"en","value":"A vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: \"[J]ust to be safe, probably never happen\"."}],"metrics":[{"cvssV4_0":{"baseScore":4.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.1"}},{"cvssV3_0":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C","version":"3.0"}},{"cvssV2_0":{"baseScore":4.3,"vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"Code Injection","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-74","description":"Injection","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-01T12:00:16.465Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-360421 | Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/vuln/360421"},{"name":"VDB-360421 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/vuln/360421/cti"},{"name":"Submit #800049 | Exiftool Project Exiftool Before 13.54 Code Injection","tags":["third-party-advisory"],"url":"https://vuldb.com/submit/800049"},{"tags":["media-coverage"],"url":"https://youtu.be/WktMPapQxlM"},{"tags":["patch"],"url":"https://github.com/exiftool/exiftool/commit/5a8b6b6ead12b39e3f32f978a4efd0233facbb01#diff-5a95c56c6f98f0aa538233fd81bb9967154f3e9ebd4126a98dfb126c4c5629a4"},{"tags":["patch"],"url":"https://github.com/exiftool/exiftool/commit/5a8b6b6ead12b39e3f32f978a4efd0233facbb01"},{"tags":["patch"],"url":"https://github.com/exiftool/exiftool/releases/tag/13.54"},{"tags":["product"],"url":"https://github.com/exiftool/exiftool/"}],"tags":["x_open-source"],"timeline":[{"lang":"en","time":"2026-05-01T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-05-01T02:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-05-01T08:25:50.000Z","value":"VulDB entry last update"}],"title":"Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-7580","datePublished":"2026-05-01T12:00:16.465Z","dateReserved":"2026-05-01T06:20:12.971Z","dateUpdated":"2026-05-01T12:00:16.465Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-01 12:16:17","lastModifiedDate":"2026-05-01 15:26:24","problem_types":["CWE-74","CWE-94","CWE-94 Code Injection","CWE-74 Injection"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":1.9,"baseSeverity":"LOW","attackVector":"LOCAL","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":3.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:S/C:P/I:P/A:P","baseScore":4.3,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.1,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"7580","Ordinal":"1","Title":"Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injectio","CVE":"CVE-2026-7580","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"7580","Ordinal":"1","NoteData":"A vulnerability was detected in Exiftool up to 13.53. Impacted is the function Process_mrld of the file lib/Image/ExifTool/GM.pm of the component JPEG/QuickTime/MOV/MP4. The manipulation of the argument -ee results in code injection. Attacking locally is a requirement. Upgrading to version 13.54 is recommended to address this issue. The patch is identified as 5a8b6b6ead12b39e3f32f978a4efd0233facbb01. It is suggested to upgrade the affected component. The fix in the source code mentions: \"[J]ust to be safe, probably never happen\".","Type":"Description","Title":"Exiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injectio"}]}}}