Heap-based Buffer Overflow in raysan5 Raylib Product
CVE-2025-15533

4.8MEDIUM

Key Information:

Vendor

Raysan5

Status
Vendor
CVE Published:
18 January 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2025-15533?

A vulnerability in the raysan5 Raylib library has been identified, specifically in the GenImageFontAtlas function within the src/rtext.c file. This flaw allows for a local attacker to execute a manipulation that results in a heap-based buffer overflow. The issue has been publicly disclosed, posing potential risks if not addressed. Users are advised to apply the provided patch (commit 5a3391fdce046bc5473e52afbd835dd2dc127146) to mitigate this vulnerability and enhance the security of their applications.

Affected Version(s)

raylib 909f040

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Oneafter (VulDB User)
.