Skip to main content

Kaspersky discovers command injection vulnerability in ExifTool affecting macOS users

2 March 2026

Flaw in widely used open-source metadata tool allows arbitrary code execution through crafted image files; patch available

Kaspersky's Global Research and Analysis Team, identified a command injection vulnerability (CVE-2026-3102) in ExifTool, a free, open-source tool used worldwide to read and edit metadata in images, videos and PDF files. The flaw, which affects macOS systems running ExifTool version 13.49 and earlier, could allow an attacker to execute arbitrary commands by embedding hidden instructions in an image file's metadata. The project maintainer, Phil Harvey, has patched the vulnerability in ExifTool version 13.50, released Feb. 7.

The vulnerability stems from improper input sanitisation in how ExifTool processes certain metadata tags on macOS. An attacker can craft a malicious PNG containing embedded commands that execute when ExifTool processes the file. The exploit is low-complexity: one command generates the weaponised image, and a second triggers execution on the target system.

Once exploited, the flaw could allow a threat actor to download and run additional malware payloads or collect sensitive information from files — including images and PDFs — stored on the compromised machine.

ExifTool is a free and open source software programme for reading, writing, and manipulating image, audio, video, and PDF metadata. It is commonly incorporated into different types of digital workflows, and is often used in digital forensic analysis and library archival. Typical OSINT pivots include extracting capture dates/locations, identifying editing software, reconciling sidecars, and comparing metadata deltas between versions.

“What makes this vulnerability stand out is the contrast between how simple it is to exploit assuming certain command line is used and how deeply ExifTool is embedded in professional workflows. Anyone running ExifTool on macOS should update to version 13.50, and teams with automated pipelines should verify which version their scripts invoke as well,” said Lucas Tay, security researcher at Kaspersky’s Global Research and Analysis Team.

To mitigate CVE-2026-3102, Kaspersky recommends to update ExifTool to version 13.50 or later. Avoid processing image files from untrusted sources with unpatched versions on macOS. Audit automated workflows and scripts that call ExifTool to confirm they reference the patched version. Organisations that rely on open-source components in their workflows can use Kaspersky's Open Source Software Threats Data Feed to continuously track vulnerabilities across their software supply chain. 

Kaspersky discovers command injection vulnerability in ExifTool affecting macOS users

Flaw in widely used open-source metadata tool allows arbitrary code execution through crafted image files; patch available
Kaspersky logo

About Kaspersky

Kaspersky is a global cybersecurity and digital privacy company founded in 1997. With over a billion devices protected to date from emerging cyberthreats and targeted attacks, Kaspersky’s deep threat intelligence and security expertise is constantly transforming into innovative solutions and services to protect individuals, businesses, critical infrastructure, and governments around the globe. The company’s comprehensive security portfolio includes leading digital life protection for personal devices, specialized security products and services for companies, as well as Cyber Immune solutions to fight sophisticated and evolving digital threats. We help millions of individuals and nearly 200,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.

Related Articles Press Releases