ExifTool version 13.49 and earlier contains a critical command injection vulnerability, CVE-2026-3102, which allows attackers to execute arbitrary shell commands on macOS systems through malicious image file metadata.
Key Points
- The vulnerability exists in the
SetMacOSTagsfunction, where unsanitized user input is passed to a system command sink. - Attackers can trigger the flaw by using the
-tagsFromFilefeature to copy metadata into theFileCreateDatetag. - Exploitation requires the
-nflag to bypass standard date-time formatting filters, allowing for the injection of malicious shell commands. - Developers patched the issue in ExifTool version 13.50 by replacing dangerous string concatenation with secure, list-based system calls.
- Users are advised to update to version 13.50 or later to prevent potential system compromise and unauthorized code execution.