← Back to CVEs
CVE-2026-6192
LOW3.3
Description
A vulnerability was identified in uclouvain openjpeg up to 2.5.4. This impacts the function opj_pi_initialise_encode in the library src/lib/openjp2/pi.c. The manipulation leads to integer overflow. The attack must be carried out locally. The exploit is publicly available and might be used. The identifier of the patch is 839936aa33eb8899bbbd80fda02796bb65068951. It is suggested to install a patch to address this issue.
CVE Details
CVSS v3.1 Score3.3
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published4/13/2026
Last Modified4/22/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-189CWE-190
References
https://github.com/uclouvain/openjpeg/(cna@vuldb.com)
https://github.com/uclouvain/openjpeg/commit/839936aa33eb8899bbbd80fda02796bb65068951(cna@vuldb.com)
https://github.com/uclouvain/openjpeg/issues/1619(cna@vuldb.com)
https://github.com/uclouvain/openjpeg/pull/1628(cna@vuldb.com)
https://vuldb.com/submit/797385(cna@vuldb.com)
https://vuldb.com/vuln/357114(cna@vuldb.com)
https://vuldb.com/vuln/357114/cti(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.