Critical ExifTool Flaw Allow Attackers to Compromise Your Mac Via Malicious Image
Discovered by Kaspersky’s Global Research and Analysis Team (GReAT) in February 2026 and patched within the same month, the flaw affects ExifTool version 13.49 and earlier.
ExifTool refers to a widely adopted utility for reading and writing metadata in image, PDF, audio, and video files.
It is available as both a standalone command-line tool and an embeddable library, making its attack surface broad across newsrooms, creative agencies, and macOS-based media workflows.
The vulnerability stems from unsanitized user input reaching a system() sink inside the SetMacOSTags function.
Specifically, the date value stored in the $val variable derived from the FileCreateDate or MDItemFSCreationDate metadata tag is passed directly to a shell command without proper escaping.
The flaw parallels the earlier CVE-2021-22204, which exploited weak regex-based sanitization before feeding user input into an eval sink.
CVE-2026-3102 follows the same pattern but targets the system() function instead, discovered by auditing adjacent input-validation routines across the ExifTool codebase.
Exploitation requires the -n (or --printConv) flag, which bypasses ExifTool’s built-in PrintConvInv date validation filter and accepts raw, unformatted metadata values.
An attacker embeds malicious shell commands in the DateTimeOriginal metadata field of an image, which normally records when a photo was taken.
Direct writes to FileCreateDate are rejected by ExifTool’s validator, so the attacker instead uses the legitimate -tagsFromFile feature to copy the poisoned tag value into FileCreateDate, triggering the unsanitized system() call.
The attack works in two conditions: the target must be running macOS, and ExifTool must process the file with the -n flag active.
Once executed, attackers can download secondary payloads, infostealers, Trojans, or remote access tools from attacker-controlled servers, according to Securelist, silently deploying them on the compromised machine.
ExifTool maintainer Phil Harvey promptly released version 13.50 following Kaspersky’s disclosure. The fix replaces the vulnerable string-concatenated system() call with a list-form invocation, eliminating the need for manual shell escaping entirely:
# BEFORE (vulnerable)
system "/usr/bin/setfile -d '${val}' '${f}'";
# AFTER (patched)
system('/usr/bin/setfile', '-d', $val, $file); This architectural change removes shell interpretation risk at the API level, providing a robust, codebase-wide mitigation rather than a localized patch. Proof-of-concept exploit code has already been publicly reported, underscoring the urgency of patching unprotected systems.
CVE-2026-3102 reinforces a core secure-coding principle: replacing fragile string concatenation with list-based API calls is the most reliable defense against command injection in evolving codebases.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google.
The post Critical ExifTool Flaw Allow Attackers to Compromise Your Mac Via Malicious Image appeared first on Cyber Security News.
Nicolas Cage has said that The Odyssey director Christopher Nolan is on the list of…
Sebastian Stan obliquely addressed his casting in The Batman: Part II while promoting his Palme…
Idris Elba isn't just taking himself out of the running to play James Bond in…
Karmine Corp, the French Esports team who’s reached the semifinals in the last two Rocket…
A new weekend has arrived, and today, you can save big on the M5 MacBook…
Star Wars: The Mandalorian and Grogu brought in an estimated $165 million at the global…
This website uses cookies.