CVE-2025-15155

5.3 MEDIUM
Published: December 28, 2025 Modified: January 06, 2026
View on NVD

Description

A vulnerability was detected in floooh sokol up to 16cbcc864012898793cd2bc57f802499a264ea40. The impacted element is the function _sg_pipeline_desc_defaults in the library sokol_gfx.h. The manipulation results in stack-based buffer overflow. The attack requires a local approach. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is identified as 5d11344150973f15e16d3ec4ee7550a73fb995e0. It is advisable to implement a patch to correct this issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/floooh/sokol/issues/1405
Source: cna@vuldb.com
Exploit Issue Tracking
https://github.com/oneafter/1212/blob/main/hbf1
Source: cna@vuldb.com
Not Applicable
https://vuldb.com/?ctiid.338533
Source: cna@vuldb.com
Permissions Required VDB Entry
https://vuldb.com/?id.338533
Source: cna@vuldb.com
Third Party Advisory VDB Entry
https://vuldb.com/?submit.719823
Source: cna@vuldb.com
Exploit Third Party Advisory VDB Entry
https://vuldb.com/?submit.719823
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit Third Party Advisory VDB Entry

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.3 / 10.0
EPSS (Exploit Probability)
0.0%
7th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

floooh