Heap-Based Buffer Overflow Vulnerability in floooh Sokol Library
CVE-2025-14958

4.8MEDIUM

Key Information:

Vendor

Floooh

Status
Vendor
CVE Published:
19 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-14958?

A significant security flaw has been identified within the floooh Sokol library, specifically in the _sg_pipeline_common_init function located in sokol_gfx.h. This vulnerability manifests as a heap-based buffer overflow, which could potentially be exploited by attackers with local access to the system. Exploitation of this vulnerability demands a careful approach, given that it is primarily intended for local execution. A patch has been released for version identification 33e2271c431bf21de001e972f72da17a984da932, and it is highly recommended for users to implement this update to secure their systems against possible exploitation.

Affected Version(s)

sokol 33e2271c431bf21de001e972f72da17a984da932

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Oneafter (VulDB User)
.
CVE-2025-14958 : Heap-Based Buffer Overflow Vulnerability in floooh Sokol Library