<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-43893 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-43893/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-43893/feed.xml" rel="self" type="application/rss+xml"/><item><title>exiftool-vendored Argument Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-exiftool-arg-injection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-exiftool-arg-injection/</guid><description>exiftool-vendored is vulnerable to argument injection (CVE-2026-43893) via newline characters in tag names, potentially allowing attackers to read or write files accessible to the ExifTool process by injecting arguments through caller-supplied strings.</description><content:encoded><![CDATA[<p>The <code>exiftool-vendored</code> npm package, versions 35.18.0 and earlier, contains an argument injection vulnerability (CVE-2026-43893) stemming from insufficient sanitization of tag names and filenames. The package starts ExifTool in <code>-stay_open True -@ -</code> mode, reading arguments from stdin.  Attackers can inject arbitrary ExifTool arguments by including newline characters in tag names, filenames, or the <code>imageHashType</code> option passed to affected APIs. This can lead to unauthorized file access or modification within the ExifTool process&rsquo;s permissions. Applications using <code>exiftool-vendored</code> and passing attacker-controlled strings to vulnerable APIs are susceptible. The vulnerability was patched in version 35.19.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious input string containing newline characters, targeting a tag name or filename parameter.</li>
<li>The attacker-controlled string is passed to a vulnerable <code>exiftool-vendored</code> API, such as <code>ExifTool#write</code>, <code>#read</code>, or <code>#deleteAllTags</code>.</li>
<li>The newline characters split the intended argument into multiple arguments when ExifTool processes the command.</li>
<li>The injected arguments could cause ExifTool to read arbitrary files accessible to the ExifTool process.</li>
<li>Alternatively, the injected arguments could cause ExifTool to write to attacker-controlled file paths accessible to the ExifTool process.</li>
<li>Sensitive information is read from arbitrary files.</li>
<li>Files are modified or overwritten.</li>
<li>The attacker achieves unauthorized data access or system modification, depending on the application&rsquo;s usage of ExifTool.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-43893 could allow attackers to read sensitive files or overwrite existing files on systems where <code>exiftool-vendored</code> is used.  The impact is dependent on the application&rsquo;s file system access permissions and its usage of the vulnerable <code>exiftool-vendored</code> APIs. There is no remote code execution reported.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>exiftool-vendored</code> version 35.19.0 or later to remediate CVE-2026-43893.</li>
<li>Apply input validation to reject strings containing control characters (specifically newlines, carriage returns, and null bytes) before passing them to affected <code>exiftool-vendored</code> APIs. Reference the example <code>assertSafeForExifTool</code> function provided in the advisory.</li>
<li>Monitor application logs for unexpected file access or modification attempts originating from the ExifTool process.</li>
<li>Deploy the provided Sigma rules to detect exploitation attempts by monitoring process command lines for injected arguments.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argument-injection</category><category>exiftool</category><category>cve-2026-43893</category></item></channel></rss>