Cyber Posture

CVE-2025-15534

MediumPublic PoC

Published: 18 January 2026

Published
18 January 2026
Modified
23 February 2026
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0001 1.9th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-15534 is a medium-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Raylib Raylib. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 1.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

Integer overflow in font loading function enables local memory corruption leading to limited code execution or privilege escalation in applications using the library.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was identified in raysan5 raylib up to 909f040. Affected by this issue is the function LoadFontData of the file src/rtext.c. The manipulation leads to integer overflow. The attack can only be performed from a local environment. The exploit…

more

is publicly available and might be used. The identifier of the patch is 5a3391fdce046bc5473e52afbd835dd2dc127146. It is suggested to install a patch to address this issue.

Deeper analysisAI

CVE-2025-15534 is an integer overflow vulnerability (CWE-189, CWE-190) in the LoadFontData function of the src/rtext.c file in the raylib library by raysan5, affecting versions up to commit 909f040. The issue was published on 2026-01-18 and carries a CVSS v3.1 base score of 5.3.

Exploitation requires a local attacker with low privileges (AV:L/AC:L/PR:L/UI:N/S:U), enabling limited impacts on confidentiality, integrity, and availability (C:L/I:L/A:L). A public exploit is available, which could be leveraged in a local environment.

The recommended mitigation is to apply the patch at commit 5a3391fdce046bc5473e52afbd835dd2dc127146. Additional details are documented in raylib repository issue #5436 and pull request #5450.

Details

CWE(s)

Affected Products

raylib
raylib
≤ 2026-01-01

CVEs Like This One

CVE-2025-15533Same product: Raylib Raylib
CVE-2025-2176Shared CWE-189, CWE-190
CVE-2025-2177Shared CWE-189, CWE-190
CVE-2026-4689Shared CWE-190
CVE-2026-0880Shared CWE-190
CVE-2025-24156Shared CWE-190
CVE-2026-0031Shared CWE-190
CVE-2026-7598Shared CWE-189, CWE-190
CVE-2025-47392Shared CWE-190
CVE-2026-40962Shared CWE-190

References