Medium severity5.3NVD Advisory· Published Jan 18, 2026· Updated Apr 29, 2026
CVE-2025-15537
CVE-2025-15537
Description
A security vulnerability has been detected in Mapnik up to 4.2.0. This issue affects the function mapnik::dbf_file::string_value of the file plugins/input/shape/dbfile.cpp. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/mapnik/mapnik/issues/4543nvdExploitIssue TrackingVendor Advisory
- vuldb.comnvdExploitThird Party AdvisoryVDB Entry
- vuldb.comnvdThird Party AdvisoryVDB Entry
- github.com/oneafter/1218/blob/main/repronvdProduct
- vuldb.comnvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.