CVE-2025-15506
📋 TL;DR
This vulnerability in OpenColorIO allows local attackers to perform out-of-bounds read operations via manipulation of the ConvertToRegularExpression function. It affects users of OpenColorIO up to version 2.5.0 who process maliciously crafted input files locally. The vulnerability could lead to information disclosure or potentially enable further exploitation.
💻 Affected Systems
- AcademySoftwareFoundation OpenColorIO
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Information disclosure leading to sensitive data exposure, or potential memory corruption enabling further local privilege escalation
Likely Case
Application crash or information disclosure from memory reads
If Mitigated
Limited impact due to local-only attack vector and low CVSS score
🎯 Exploit Status
Exploit requires local access and manipulation of input to the vulnerable function
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.5.1
Vendor Advisory: https://github.com/AcademySoftwareFoundation/OpenColorIO/issues/2228
Restart Required: Yes
Instructions:
1. Update OpenColorIO to version 2.5.1 or later
2. Apply commit ebdbb75123c9d5f4643e041314e2bc988a13f20d if building from source
3. Restart any applications using OpenColorIO
🔧 Temporary Workarounds
Input validation
allImplement strict input validation for files processed by OpenColorIO
Sandbox execution
allRun OpenColorIO processes in sandboxed environments with limited permissions
🧯 If You Can't Patch
- Restrict local access to systems running vulnerable OpenColorIO versions
- Monitor for abnormal process behavior or crashes related to OpenColorIO
🔍 How to Verify
Check if Vulnerable:
Check OpenColorIO version with 'opencolorio --version' or examine installed package version
Check Version:
opencolorio --version
Verify Fix Applied:
Verify version is 2.5.1 or later, or check for commit ebdbb75123c9d5f4643e041314e2bc988a13f20d in source
📡 Detection & Monitoring
Log Indicators:
- Application crashes related to OpenColorIO
- Memory access violation errors in application logs
Network Indicators:
- None - local-only vulnerability
SIEM Query:
Process:opencolorio AND (EventID:1000 OR ExceptionCode:c0000005)
🔗 References
- https://github.com/AcademySoftwareFoundation/OpenColorIO/
- https://github.com/AcademySoftwareFoundation/OpenColorIO/issues/2228
- https://github.com/AcademySoftwareFoundation/OpenColorIO/milestone/11
- https://github.com/AcademySoftwareFoundation/OpenColorIO/pull/2231
- https://github.com/cozdas/OpenColorIO/commit/ebdbb75123c9d5f4643e041314e2bc988a13f20d
- https://github.com/oneafter/1225/blob/main/uaf
- https://vuldb.com/?ctiid.340444
- https://vuldb.com/?id.340444
- https://vuldb.com/?submit.733332