Categories: Cyber Security News

Critical ExifTool Flaw Allow Attackers to Compromise Your Mac Via Malicious Image

A critical command injection vulnerability in ExifTool, tracked as CVE-2026-3102, could allow attackers to execute arbitrary shell commands on macOS systems simply by tricking a user into processing a maliciously crafted image file.

Discovered by Kaspersky’s Global Research and Analysis Team (GReAT) in February 2026 and patched within the same month, the flaw affects ExifTool version 13.49 and earlier.

ExifTool refers to a widely adopted utility for reading and writing metadata in image, PDF, audio, and video files.

It is available as both a standalone command-line tool and an embeddable library, making its attack surface broad across newsrooms, creative agencies, and macOS-based media workflows.

Critical ExifTool Vulnerability

The vulnerability stems from unsanitized user input reaching a system() sink inside the SetMacOSTags function.

Exiftool vulnerability enables command injection (source: securelist)

Specifically, the date value stored in the $val variable derived from the FileCreateDate or MDItemFSCreationDate metadata tag is passed directly to a shell command without proper escaping.

The flaw parallels the earlier CVE-2021-22204, which exploited weak regex-based sanitization before feeding user input into an eval sink.

CVE-2026-3102 follows the same pattern but targets the system() function instead, discovered by auditing adjacent input-validation routines across the ExifTool codebase.

Exploitation requires the -n (or --printConv) flag, which bypasses ExifTool’s built-in PrintConvInv date validation filter and accepts raw, unformatted metadata values.

An attacker embeds malicious shell commands in the DateTimeOriginal metadata field of an image, which normally records when a photo was taken.

Direct writes to FileCreateDate are rejected by ExifTool’s validator, so the attacker instead uses the legitimate -tagsFromFile feature to copy the poisoned tag value into FileCreateDate, triggering the unsanitized system() call.

Exiftool command injection demonstrated (source: securelist)

The attack works in two conditions: the target must be running macOS, and ExifTool must process the file with the -n flag active.

Once executed, attackers can download secondary payloads, infostealers, Trojans, or remote access tools from attacker-controlled servers, according to Securelist, silently deploying them on the compromised machine.

Patch Analysis

ExifTool maintainer Phil Harvey promptly released version 13.50 following Kaspersky’s disclosure. The fix replaces the vulnerable string-concatenated system() call with a list-form invocation, eliminating the need for manual shell escaping entirely:

# BEFORE (vulnerable)
system "/usr/bin/setfile -d '${val}' '${f}'";

# AFTER (patched)
system('/usr/bin/setfile', '-d', $val, $file);

This architectural change removes shell interpretation risk at the API level, providing a robust, codebase-wide mitigation rather than a localized patch. Proof-of-concept exploit code has already been publicly reported, underscoring the urgency of patching unprotected systems.

  • Update immediately – upgrade ExifTool to version 13.50 or later on all macOS systems.
  • Audit embedded copies – verify that asset management platforms, photo editors, and bulk processing scripts do not use an older bundled ExifTool library.
  • Isolate untrusted file processing – process images from unknown sources on a dedicated machine or sandboxed virtual environment with limited network access
  • Enforce endpoint security on BYOD/contractor devices: only allow devices with active macOS security solutions to access corporate networks.
  • Monitor software supply chain – use open-source software threat tracking feeds to detect vulnerable components in automated workflows.

CVE-2026-3102 reinforces a core secure-coding principle: replacing fragile string concatenation with list-based API calls is the most reliable defense against command injection in evolving codebases.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Critical ExifTool Flaw Allow Attackers to Compromise Your Mac Via Malicious Image appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Nicolas Cage Says Christopher Nolan Won’t ‘Call Me Back’ After Turning Down Insomnia Role

Nicolas Cage has said that The Odyssey director Christopher Nolan is on the list of…

11 minutes ago

Sebastian Stan Reveals He Plays “Many Roles” in The Batman: Part II

Sebastian Stan obliquely addressed his casting in The Batman: Part II while promoting his Palme…

1 hour ago

Idris Elba Says He Was Never in the Race to Play James Bond for New 007 Movie

Idris Elba isn't just taking himself out of the running to play James Bond in…

1 hour ago

Karmine Corp Crowned Champions of Rocket League Paris Major

Karmine Corp, the French Esports team who’s reached the semifinals in the last two Rocket…

2 hours ago

The Best Deals Today: RX 9070 XT, M5 MacBook Air, LEGO Back to the Future, and More

A new weekend has arrived, and today, you can save big on the M5 MacBook…

3 hours ago

Star Wars: The Mandalorian and Grogu Opened to an Estimated $165 Million at the Box Office

Star Wars: The Mandalorian and Grogu brought in an estimated $165 million at the global…

3 hours ago

This website uses cookies.