CVE-2025-15537

A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Configurations

No configuration.

History

20 Jan 2026, 17:15

Type Values Removed Values Added
References () https://github.com/mapnik/mapnik/issues/4543 - () https://github.com/mapnik/mapnik/issues/4543 -

18 Jan 2026, 10:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-18 10:15

Updated : 2026-01-26 15:05


NVD link : CVE-2025-15537

Mitre link : CVE-2025-15537

CVE.ORG link : CVE-2025-15537


JSON object : View

Products Affected

No product.

CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow