CVE-2026-47114
IINA mpv_-prefixed Command Execution Vulnerability
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| iina | iina | to 1.4.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-88 | The product constructs a string for a command to be executed by a separate component in another control sphere, but it does not properly delimit the intended arguments, options, or switches within that command string. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability allows remote attackers to execute arbitrary commands on your macOS system with your user privileges if you approve a malicious protocol prompt.
Such arbitrary command execution can lead to compromise of your system, including unauthorized access, data theft, installation of malware, or other malicious activities.
Exploitation requires user interaction but does not require opening a valid media file, making it easier for attackers to trick users.
Can you explain this vulnerability to me?
IINA versions before 1.4.3 contain a user-assisted command execution vulnerability involving the iina://open custom URL scheme handler.
Attackers can craft URLs with malicious mpv_-prefixed query parameters, such as mpv_options or input-commands, which are passed unvalidated into the mpv runtime.
When a user clicks such a crafted URL in a browser and approves the protocol prompt, arbitrary commands can be executed on the victim's macOS system as the current user, without needing a valid media file.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves the iina://open custom URL scheme handler processing malicious mpv_-prefixed query parameters, which leads to arbitrary command execution upon user approval of the browser protocol prompt.
Detection on your system or network would involve monitoring for suspicious iina://open URL scheme invocations containing mpv_options or input-commands parameters, especially those that appear crafted or unexpected.
Since the vulnerability requires user interaction via a browser protocol prompt, you can check browser history or logs for URLs starting with iina://open that include suspicious query parameters.
On macOS systems, you might use commands to search for recent URL scheme invocations or monitor application logs for warnings related to mpv input-commands.
- Check browser history or logs for URLs matching the pattern: iina://open?mpv_options=... or iina://open?input-commands=...
- Use macOS Console or log commands to search for warnings or errors related to iina or mpv input-commands, e.g., `log show --predicate 'process == "iina"' --last 1d | grep mpv`
- Monitor network traffic for HTTP/HTTPS requests containing iina://open URLs if proxied or logged.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update IINA to version 1.4.3 or later, which contains a patch that rejects mpv input-commands in the URL scheme, preventing this command execution vulnerability.
Until the update can be applied, users should be cautious about clicking on iina://open URLs received from untrusted sources, especially those that trigger the browser protocol prompt.
Disabling or restricting the handling of the iina://open URL scheme in browsers or system settings may reduce exposure.
- Update IINA to version 1.4.3 or later immediately.
- Avoid clicking on suspicious or unsolicited iina://open URLs.
- Consider monitoring and restricting URL scheme handlers for iina in browser or system preferences.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
IINA before version 1.4.3 contains a high-severity command execution vulnerability that allows remote attackers to execute arbitrary commands as the current macOS user upon user approval. This could lead to unauthorized access or control over user data and system resources.
Such unauthorized command execution and potential data compromise could negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal and sensitive data against unauthorized access and breaches.
However, the provided information does not explicitly discuss or analyze the direct impact of this vulnerability on compliance with these regulations.