Vulnerability Description
Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions 0.28.5 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. The bug is fixed in version 0.28.6.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exiv2 | Exiv2 | < 0.28.6 |
Related Weaknesses (CWE)
References
- https://github.com/Exiv2/exiv2/commit/e737332427711f15bcdc4e903203d6b7493eaec0Patch
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-496f-x7cq-cq39Third Party Advisory
FAQ
What is CVE-2025-54080?
CVE-2025-54080 is a vulnerability with a CVSS score of 5.5 (MEDIUM). Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions 0.28.5 and earlier. The ou...
How severe is CVE-2025-54080?
CVE-2025-54080 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-54080?
Check the references section above for vendor advisories and patch information. Affected products include: Exiv2 Exiv2.