A vulnerability has been found in Mapnik up to 4.2.0. This vulnerability affects the function mapnik::detail::mod<...>::operator of the file src/value.cpp. The manipulation leads to divide by zero. The attack needs to be performed locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/mapnik/mapnik/ | Product |
| https://github.com/mapnik/mapnik/issues/4545 | Exploit Issue Tracking |
| https://github.com/oneafter/1219/blob/main/repro | Exploit |
| https://vuldb.com/?ctiid.344502 | Permissions Required VDB Entry |
| https://vuldb.com/?id.344502 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.743386 | Third Party Advisory VDB Entry |
Configurations
History
28 Feb 2026, 00:27
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:mapnik:mapnik:*:*:*:*:*:*:*:* | |
| First Time |
Mapnik
Mapnik mapnik |
|
| References | () https://github.com/mapnik/mapnik/ - Product | |
| References | () https://github.com/mapnik/mapnik/issues/4545 - Exploit, Issue Tracking | |
| References | () https://github.com/oneafter/1219/blob/main/repro - Exploit | |
| References | () https://vuldb.com/?ctiid.344502 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.344502 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.743386 - Third Party Advisory, VDB Entry | |
| Summary |
|
07 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-07 22:16
Updated : 2026-02-28 00:27
NVD link : CVE-2025-15564
Mitre link : CVE-2025-15564
CVE.ORG link : CVE-2025-15564
JSON object : View
Products Affected
mapnik
- mapnik
