Heap-based Buffer Overflow in OSGeo GDAL Affects Multiple Versions
CVE-2026-8087

4.8MEDIUM

Key Information:

Vendor

Osgeo

Status
Vendor
CVE Published:
7 May 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-8087?

A vulnerability in OSGeo GDAL's GDnentries function, located in the GDapi.c file, has been identified that could lead to a heap-based buffer overflow. This issue arises from improper handling of the DataFieldName argument, opening the door for local attackers to exploit the flaw. The exploit has been publicly released, underscoring the urgency for affected users. Users are strongly advised to upgrade to version 3.13.0RC1 or later, which includes the necessary patch to remediate this vulnerability.

Affected Version(s)

gdal 3.13.0dev-4

gdal 3.13.0RC1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

biniam (VulDB User)
.