CVE-2026-1418

5.3 MEDIUM

📋 TL;DR

This CVE describes an out-of-bounds write vulnerability in GPAC's SRT subtitle import function. Attackers with local access can exploit this to potentially execute arbitrary code or crash the application. Users of GPAC up to version 2.4.0 are affected.

💻 Affected Systems

Products:
  • GPAC
Versions: Up to and including 2.4.0
Operating Systems: All platforms running GPAC
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the SRT subtitle import functionality, so only affects systems processing SRT subtitle files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation leading to full system compromise if exploited by a malicious user with local access.

🟠

Likely Case

Application crash (denial of service) or limited code execution in the context of the GPAC process.

🟢

If Mitigated

No impact if proper access controls prevent local users from running malicious subtitle files.

🌐 Internet-Facing: LOW - Attack requires local access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Internal users with local access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit has been publicly disclosed and requires local access to execute malicious subtitle files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit 10c73b82cf0e367383d091db38566a0e4fe71772

Vendor Advisory: https://github.com/gpac/gpac/issues/3425

Restart Required: Yes

Instructions:

1. Update GPAC to version after 2.4.0 or apply commit 10c73b82cf0e367383d091db38566a0e4fe71772. 2. Rebuild from source if using custom build. 3. Restart any GPAC processes.

🔧 Temporary Workarounds

Disable SRT subtitle processing

all

Prevent GPAC from processing SRT subtitle files to mitigate the vulnerability

Configure GPAC to reject SRT subtitle files or disable subtitle import functionality

Restrict file access

linux

Limit local user access to subtitle files and GPAC executable

chmod 750 /path/to/gpac
chown root:root /path/to/gpac

🧯 If You Can't Patch

  • Implement strict access controls to prevent local users from running malicious subtitle files
  • Monitor for suspicious subtitle file processing and GPAC crashes

🔍 How to Verify

Check if Vulnerable:

Check GPAC version with 'gpac -version' or 'gpac --version' and verify if it's 2.4.0 or earlier

Check Version:

gpac -version

Verify Fix Applied:

Verify GPAC version is newer than 2.4.0 or check if commit 10c73b82cf0e367383d091db38566a0e4fe71772 is applied in source builds

📡 Detection & Monitoring

Log Indicators:

  • GPAC process crashes when processing subtitle files
  • Unexpected memory access errors in system logs

Network Indicators:

  • None - this is a local vulnerability

SIEM Query:

Process:gpac AND (EventID:1000 OR EventID:1001) OR FilePath:*.srt AND Process:gpac

🔗 References

📤 Share & Export