MaterialX is an open standard for the exchange of rich material and look-development content across applications and renderers. In version 1.39.2, when parsing shader nodes in a MTLX file, the MaterialXCore code accesses a potentially null pointer, which can lead to crashes with maliciously crafted files. An attacker could intentionally crash a target program that uses OpenEXR by sending a malicious MTLX file. This is fixed in version 1.39.3.
References
Configurations
History
20 Aug 2025, 21:24
Type | Values Removed | Values Added |
---|---|---|
First Time |
Linuxfoundation
Linuxfoundation materialx |
|
CPE | cpe:2.3:a:linuxfoundation:materialx:1.39.2:-:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/AcademySoftwareFoundation/MaterialX/commit/e13344ba13326869d7820b444705f24d56fab73d - Patch | |
References | () https://github.com/AcademySoftwareFoundation/MaterialX/security/advisories/GHSA-3jhf-gxhr-q4cx - Exploit, Vendor Advisory | |
References | () https://github.com/ShielderSec/poc/tree/main/CVE-2025-53010 - Exploit |
04 Aug 2025, 15:06
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
01 Aug 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-01 18:15
Updated : 2025-08-20 21:24
NVD link : CVE-2025-53010
Mitre link : CVE-2025-53010
CVE.ORG link : CVE-2025-53010
JSON object : View
Products Affected
linuxfoundation
- materialx
CWE
CWE-476
NULL Pointer Dereference