9.8 CVE-2025-53644
Patch Exploit
OpenCV is an Open Source Computer Vision Library. Versions 4.10.0 and 4.11.0 have an uninitialized pointer variable on stack that may lead to arbitrary heap buffer write when reading crafted JPEG images. Version 4.12.0 fixes the vulnerability.
https://nvd.nist.gov/vuln/detail/CVE-2025-53644
Categories
CWE-457 : Use of Uninitialized Variable
In some languages such as C and C++, stack variables are not initialized by default. They generally contain junk data with the contents of stack memory before the function was invoked. An attacker can sometimes control or read these contents. In other languages or conditions, a variable that is not explicitly initialized can be given a default value that has security implications, depending on the logic of the program. The presence of an uninitialized variable can sometimes indicate a typographic error in the code.
References
security-advisories@github.com Patch Exploit
| https://github.com/opencv/opencv/commit/a39db41390de546d18962ee1278bd6dbb715f466 Patch |
| https://github.com/opencv/opencv/issues/27271 Issue Tracking |
| https://github.com/opencv/opencv/releases/tag/4.12.0 Release Notes |
| https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV/ Exploit Third Party Advisory |
CPE
| cpe | start | end |
|---|---|---|
| Configuration 1 | ||
| cpe:2.3:a:opencv:opencv:*:*:*:*:*:*:*:* | >= 4.10.0 | < 4.12.0 |
REMEDIATION
Patch
| Url |
|---|
| https://github.com/opencv/opencv/commit/a39db41390de546d18962ee1278bd6dbb715f466 |
EXPLOITS
Exploit-db.com
| id | description | date | |
|---|---|---|---|
| No known exploits | |||
POC Github
| Url |
|---|
| No known exploits |
Other Nist (github, ...)
| Url |
|---|
| https://securitylab.github.com/advisories/GHSL-2025-057_OpenCV/ |
CAPEC
Common Attack Pattern Enumerations and Classifications
| id | description | severity |
|---|---|---|
| No entry | ||
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
