Integer Overflow Vulnerability in uclouvain OpenJPEG Library
CVE-2026-6192

4.8MEDIUM

Key Information:

Vendor

Uclouvain

Status
Vendor
CVE Published:
13 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-6192?

The uclouvain OpenJPEG library is susceptible to an integer overflow vulnerability within the function opj_pi_initialise_encode located in src/lib/openjp2/pi.c. This local attack can lead to unauthorized manipulation and exploitation of the library's functionality. It is crucial for users to be aware that an exploit is publicly available, emphasizing the importance of promptly applying the provided patch to ensure protection against potential attacks.

Affected Version(s)

openjpeg 2.5.0

openjpeg 2.5.1

openjpeg 2.5.2

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kery Qi (VulDB User)
.