Vulnerability Description
MaterialX is an open standard for the exchange of rich material and look-development content across applications and renderers. In versions 1.39.2 and below, when parsing an MTLX file with multiple nested nodegraph implementations, the MaterialX XML parsing logic can potentially crash due to stack exhaustion. An attacker could intentionally crash a target program that uses OpenEXR by sending a malicious MTLX file. This is fixed in version 1.39.3.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linuxfoundation | Materialx | 1.39.2 |
Related Weaknesses (CWE)
References
- https://github.com/AcademySoftwareFoundation/MaterialX/issues/2504Issue Tracking
- https://github.com/AcademySoftwareFoundation/MaterialX/pull/2505Issue TrackingPatch
- https://github.com/AcademySoftwareFoundation/MaterialX/releases/tag/v1.39.3Release Notes
- https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-ExploitVendor Advisory
- https://github.com/ShielderSec/poc/tree/main/CVE-2025-53009Exploit
FAQ
What is CVE-2025-53009?
CVE-2025-53009 is a vulnerability with a CVSS score of 7.5 (HIGH). MaterialX is an open standard for the exchange of rich material and look-development content across applications and renderers. In versions 1.39.2 and below, when parsing an MTLX file with multiple ne...
How severe is CVE-2025-53009?
CVE-2025-53009 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-53009?
Check the references section above for vendor advisories and patch information. Affected products include: Linuxfoundation Materialx.