spot_img

Date:

Share:

Kaspersky discovers command injection vulnerability in ExifTool affecting macOS users

Kaspersky’s Global Research and Analysis Team, identified a command injection vulnerability (CVE-2026-3102) in ExifTool, a free, open-source tool used worldwide to read and edit metadata in images, videos and PDF files. The flaw, which affects macOS systems running ExifTool version 13.49 and earlier, could allow an attacker to execute arbitrary commands by embedding hidden instructions in an image file’s metadata. The project maintainer, Phil Harvey, has patched the vulnerability in ExifTool version 13.50, released Feb. 7.

The vulnerability stems from improper input sanitisation in how ExifTool processes certain metadata tags on macOS. An attacker can craft a malicious PNG containing embedded commands that execute when ExifTool processes the file. The exploit is low-complexity: one command generates the weaponised image, and a second triggers execution on the target system.

Once exploited, the flaw could allow a threat actor to download and run additional malware payloads or collect sensitive information from files — including images and PDFs — stored on the compromised machine.

ExifTool is a free and open source software programme for reading, writing, and manipulating image, audio, video, and PDF metadata. It is commonly incorporated into different types of digital workflows, and is often used in digital forensic analysis and library archival. Typical OSINT pivots include extracting capture dates/locations, identifying editing software, reconciling sidecars, and comparing metadata deltas between versions.

“What makes this vulnerability stand out is the contrast between how simple it is to exploit assuming certain command line is used and how deeply ExifTool is embedded in professional workflows. Anyone running ExifTool on macOS should update to version 13.50, and teams with automated pipelines should verify which version their scripts invoke as well,” said Lucas Tay, security researcher at Kaspersky’s Global Research and Analysis Team.

To mitigate CVE-2026-3102, Kaspersky recommends to update ExifTool to version 13.50 or later. Avoid processing image files from untrusted sources with unpatched versions on macOS. Audit automated workflows and scripts that call ExifTool to confirm they reference the patched version. Organisations that rely on open-source components in their workflows can use Kaspersky’s Open Source Software Threats Data Feed to continuously track vulnerabilities across their software supply chain.

spot_img
spot_img

━ More like this

AI Has Turned Biometric Security Into a Fraud Target, New Data Shows

New data shows nearly 9 in 10 failed identity checks in Southern Africa are linked to AI-driven impersonation.  The systems designed to verify identity and...

Online scam exposure remains widespread despite high levels of self-assurance, Kaspersky reports

A recent Kaspersky survey highlights a considerable gap between consumers’ confidence in identifying online scams and their actual exposure to cyber threats. According to...

Identity under siege: The new order of security in 2026

The threat model has changed as artificial intelligence lowers the barrier to entry for cybercrime. Attack velocity and threat veracity have increased exponentially. Impersonation...

High-severity incidents at a minimum: Kaspersky experts reveal a steady decline over the years

According to the ‘Anatomy of a Cyber World: Global Report by Kaspersky Security Services’, there has been a noticeable decline in the percentage of high-severity incidents...

Kaspersky discovers new SparkCat variant bypassing App Store and Google Play security

 Kaspersky has identified a new variant of the SparkCat Trojan in the App Store and in Google Play — a year after the crypto-stealing...
spot_img