
Discovered by Kaspersky’s Global Research and Analysis Team (GReAT) in February 2026 and patched within the same month, the flaw affects ExifTool version 13.49 and earlier.
ExifTool refers to a widely adopted utility for reading and writing metadata in image, PDF, audio, and video files.
It is available as both a standalone command-line tool and an embeddable library, making its attack surface broad across newsrooms, creative agencies, and macOS-based media workflows.
Critical ExifTool Vulnerability
The vulnerability stems from unsanitized user input reaching a system() sink inside the SetMacOSTags function.

Specifically, the date value stored in the $val variable derived from the FileCreateDate or MDItemFSCreationDate metadata tag is passed directly to a shell command without proper escaping.
The flaw parallels the earlier CVE-2021-22204, which exploited weak regex-based sanitization before feeding user input into an eval sink.
CVE-2026-3102 follows the same pattern but targets the system() function instead, discovered by auditing adjacent input-validation routines across the ExifTool codebase.
Exploitation requires the -n (or --printConv) flag, which bypasses ExifTool’s built-in PrintConvInv date validation filter and accepts raw, unformatted metadata values.
An attacker embeds malicious shell commands in the DateTimeOriginal metadata field of an image, which normally records when a photo was taken.
Direct writes to FileCreateDate are rejected by ExifTool’s validator, so the attacker instead uses the legitimate -tagsFromFile feature to copy the poisoned tag value into FileCreateDate, triggering the unsanitized system() call.

The attack works in two conditions: the target must be running macOS, and ExifTool must process the file with the -n flag active.
Once executed, attackers can download secondary payloads, infostealers, Trojans, or remote access tools from attacker-controlled servers, according to Securelist, silently deploying them on the compromised machine.
Patch Analysis
ExifTool maintainer Phil Harvey promptly released version 13.50 following Kaspersky’s disclosure. The fix replaces the vulnerable string-concatenated system() call with a list-form invocation, eliminating the need for manual shell escaping entirely:
# BEFORE (vulnerable)
system "/usr/bin/setfile -d '${val}' '${f}'";
# AFTER (patched)
system('/usr/bin/setfile', '-d', $val, $file);This architectural change removes shell interpretation risk at the API level, providing a robust, codebase-wide mitigation rather than a localized patch. Proof-of-concept exploit code has already been publicly reported, underscoring the urgency of patching unprotected systems.
Mitigations
- Update immediately – upgrade ExifTool to version 13.50 or later on all macOS systems.
- Audit embedded copies – verify that asset management platforms, photo editors, and bulk processing scripts do not use an older bundled ExifTool library.
- Isolate untrusted file processing – process images from unknown sources on a dedicated machine or sandboxed virtual environment with limited network access
- Enforce endpoint security on BYOD/contractor devices: only allow devices with active macOS security solutions to access corporate networks.
- Monitor software supply chain – use open-source software threat tracking feeds to detect vulnerable components in automated workflows.
CVE-2026-3102 reinforces a core secure-coding principle: replacing fragile string concatenation with list-based API calls is the most reliable defense against command injection in evolving codebases.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Critical ExifTool Flaw Allow Attackers to Compromise Your Mac Via Malicious Image appeared first on Cyber Security News.
Discover more from RSS Feeds Cloud
Subscribe to get the latest posts sent to your email.
