CVE-2026-24808

N/A Unknown

📋 TL;DR

An integer overflow vulnerability in RawTherapee's rtengine modules could allow attackers to cause denial of service or potentially execute arbitrary code by processing specially crafted image files. This affects all users of RawTherapee version 5.11 and earlier who open untrusted RAW image files.

💻 Affected Systems

Products:
  • RawTherapee
Versions: through 5.11
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in dcraw.Cc file within rtengine modules, triggered when processing RAW image files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise if the integer overflow enables memory corruption that can be weaponized.

🟠

Likely Case

Application crash (denial of service) when processing malicious image files, potentially causing data loss in unsaved editing sessions.

🟢

If Mitigated

Limited impact if only trusted image sources are used and application runs with minimal privileges.

🌐 Internet-Facing: LOW - RawTherapee is not typically deployed as an internet-facing service.
🏢 Internal Only: MEDIUM - Users opening untrusted image files from external sources could trigger the vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious image file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.11 (check GitHub for latest)

Vendor Advisory: https://github.com/RawTherapee/RawTherapee/pull/7359

Restart Required: Yes

Instructions:

1. Update RawTherapee to latest version from official sources. 2. Restart the application after installation. 3. Verify version is greater than 5.11.

🔧 Temporary Workarounds

Restrict image sources

all

Only open RAW image files from trusted sources

Run with reduced privileges

all

Run RawTherapee with limited user permissions to reduce impact

🧯 If You Can't Patch

  • Discontinue use of RawTherapee for processing untrusted image files
  • Use alternative RAW processing software until patch can be applied

🔍 How to Verify

Check if Vulnerable:

Check RawTherapee version in Help > About. If version is 5.11 or earlier, you are vulnerable.

Check Version:

On Linux: rawtherapee --version | grep -i version

Verify Fix Applied:

Verify version is greater than 5.11 and check that the fix commit is included in your build.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening image files
  • Memory access violation errors in system logs

Network Indicators:

  • No network indicators - local file processing vulnerability

SIEM Query:

Process:rawtherapee AND (EventID:1000 OR EventID:1001) AND ExceptionCode:c0000005

🔗 References

📤 Share & Export