CVE-2025-65834

9.8 CRITICAL

📋 TL;DR

CVE-2025-65834 is a critical buffer overflow vulnerability in Shotcut video editor that allows remote code execution when processing malicious MLT project files. Attackers can craft files with manipulated width/height parameters to trigger memory corruption. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Meltytech Shotcut
Versions: 25.10.31 and potentially earlier versions
Operating Systems: Windows, macOS, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; no special configuration required to be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the Shotcut process, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash (denial of service) or arbitrary code execution when users open malicious project files from untrusted sources.

🟢

If Mitigated

Limited to application crash if exploit fails or memory protections prevent code execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but these could be distributed via websites, email, or downloads.
🏢 Internal Only: MEDIUM - Similar risk internally if users share project files; requires user interaction to trigger.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user to open a malicious MLT project file; no authentication needed. The vulnerability is in file parsing logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not yet released

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

1. Monitor Shotcut official channels for security updates. 2. When patch is released, download and install the updated version. 3. Restart the application after installation.

🔧 Temporary Workarounds

Avoid untrusted MLT files

all

Do not open MLT project files from unknown or untrusted sources.

Use application sandboxing

all

Run Shotcut in a sandboxed environment to limit potential damage from exploitation.

🧯 If You Can't Patch

  • Discontinue use of Shotcut until patch is available and tested
  • Implement network segmentation to isolate systems running vulnerable versions

🔍 How to Verify

Check if Vulnerable:

Check Shotcut version via Help > About menu; if version is 25.10.31 or potentially earlier, system is vulnerable.

Check Version:

On Linux: shotcut --version; On Windows/macOS: Check via GUI Help > About

Verify Fix Applied:

After patching, verify version is higher than 25.10.31 via Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crash logs mentioning mlt_image_fill_white
  • Unexpected memory allocation failures

Network Indicators:

  • Downloads of MLT files from suspicious sources

SIEM Query:

Process:shotcut AND (EventID:1000 OR ExceptionCode:c0000005)

🔗 References

📤 Share & Export