<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>IINA (&lt; 1.4.3) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/iina--1.4.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 20:18:33 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/iina--1.4.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-47114 - IINA Command Execution Vulnerability via Custom URL Scheme</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-47114-iina-command-exec/</link><pubDate>Thu, 21 May 2026 20:18:33 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-47114-iina-command-exec/</guid><description>IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler.</description><content:encoded><![CDATA[<p>IINA before version 1.4.3 is susceptible to a user-assisted command execution vulnerability (CVE-2026-47114). This flaw enables remote attackers to execute arbitrary commands on a targeted macOS system. The attack vector involves crafting a malicious URL that exploits the iina://open custom URL scheme. Specifically, the vulnerability stems from the improper handling of <code>mpv_options</code> and <code>input-commands</code> parameters passed to the underlying <code>mpv</code> runtime. An attacker can deliver a crafted URL, typically through a web browser. When the user approves the browser&rsquo;s prompt to open the URL with IINA, the specially crafted parameters are passed to the <code>mpv</code> runtime, leading to arbitrary command execution with the privileges of the current macOS user. A valid media file is not required for exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious URL using the <code>iina://open</code> scheme, embedding harmful commands within <code>mpv_options</code> or <code>input-commands</code> parameters.</li>
<li>The crafted URL is delivered to the victim, typically through a link in a website or email.</li>
<li>The victim clicks on the malicious URL, triggering a browser prompt asking for permission to open the URL with IINA.</li>
<li>The user approves the browser protocol prompt.</li>
<li>IINA receives the URL and passes the <code>mpv_options</code> and <code>input-commands</code> parameters to the <code>mpv</code> runtime.</li>
<li>The <code>mpv</code> runtime executes the attacker-supplied commands.</li>
<li>Arbitrary commands are executed on the macOS system with the privileges of the user running IINA.</li>
<li>The attacker achieves code execution, potentially leading to system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to execute arbitrary commands on the victim&rsquo;s macOS system with the privileges of the user running IINA. This can result in data theft, malware installation, or complete system compromise. The CVSS v3.1 base score for this vulnerability is 8.8, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade IINA to version 1.4.3 or later to patch CVE-2026-47114.</li>
<li>Deploy the Sigma rules provided below to detect potential exploitation attempts.</li>
<li>Educate users to be cautious when opening URLs, especially those using custom URL schemes, and to carefully review the prompt before granting permission.</li>
<li>Monitor process creation events on macOS for processes spawned by IINA with unusual command-line arguments, using the process_creation rule provided below.</li>
<li>Implement network connection monitoring to detect any suspicious outbound connections originating from IINA after potential command execution.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command execution</category><category>custom url scheme</category><category>macos</category><category>CVE-2026-47114</category></item></channel></rss>