CVE-2026-43893
Argument Injection in exiftool-vendored
Publication date: 2026-05-11
Last updated on: 2026-05-11
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| exiftool-vendored | exiftool | to 35.19.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-88 | The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability exists in exiftool-vendored versions prior to 35.19.0, which provides Node.js access to ExifTool. In these affected versions, certain user-supplied strings were inserted into ExifTool command arguments without properly rejecting line delimiters such as newlines or carriage returns. This flaw allows an attacker to inject additional arguments into the ExifTool command by splitting a single intended argument into multiple ones. Additionally, unsafe control characters like NUL bytes were not rejected. This can lead to ExifTool reading or writing files that the attacker chooses, potentially accessing files accessible to the ExifTool process.
The vulnerability does not allow remote code execution, and it was fixed in version 35.19.0 by rejecting unsafe characters and preventing argument injection.
How can this vulnerability impact me? :
If an application uses a vulnerable version of exiftool-vendored and passes attacker-controlled strings to its APIs, an attacker could exploit this vulnerability to make ExifTool read arbitrary files accessible to its process or write output to files chosen by the attacker.
This could lead to unauthorized disclosure of sensitive information or modification of files within the permissions of the ExifTool process. However, no remote code execution has been demonstrated.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update exiftool-vendored to version 35.19.0 or later, where the issue is fixed.
Avoid passing attacker-controlled strings to the affected APIs that start ExifTool with the vulnerable argument interpolation.