Cyber Posture

CVE-2026-22190

HighPublic PoC

Published: 07 January 2026

Published
07 January 2026
Modified
12 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0006 19.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22190 is a high-severity Use of Externally-Controlled Format String (CWE-134) vulnerability in Cmu Panda3D. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 19.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Format string bug directly enables reading/disclosing arbitrary stack memory (pointers + sensitive values) from the local system into attacker-retrievable output files.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional…

more

format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.

Deeper analysisAI

CVE-2026-22190 is an uncontrolled format string vulnerability (CWE-134) in the egg-mkfont tool of Panda3D, affecting versions up to and including 1.10.16. The vulnerability arises because the -gp (glyph pattern) command-line option is passed directly as the format string to sprintf() with only a single argument provided. An attacker can supply additional format specifiers via this option, causing egg-mkfont to read unintended values from the stack and incorporate the formatted output into the generated .egg and .png files, leading to disclosure of stack-resident memory and pointer values. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

The vulnerability can be exploited remotely by any unauthenticated attacker with network access to a system running the affected egg-mkfont tool, requiring low complexity and no user interaction. Exploitation involves crafting a malicious -gp argument with format specifiers such as %p or %x, tricking a user or automated process into invoking egg-mkfont with the tainted input. Successful exploitation results in information disclosure, as the leaked stack data—including memory addresses and potentially sensitive values—is embedded in the output .egg and .png files, which could then be retrieved by the attacker.

Mitigation details and patches are documented in advisories available at https://seclists.org/fulldisclosure/2026/Jan/11, https://www.vulncheck.com/advisories/panda3d-egg-mkfont-format-string-information-disclosure, the Panda3D GitHub repository at https://github.com/panda3d/panda3d, and the official site at https://www.panda3d.org/. Security practitioners should review these sources for updated versions and apply patches promptly to vulnerable Panda3D installations.

Details

CWE(s)

Affected Products

cmu
panda3d
≤ 1.10.16

CVEs Like This One

CVE-2026-22189Same product: Cmu Panda3D
CVE-2025-27092Same vendor: Cmu
CVE-2025-46121Shared CWE-134
CVE-2026-3509Shared CWE-134
CVE-2024-45324Shared CWE-134
CVE-2024-12805Shared CWE-134
CVE-2026-33210Shared CWE-134
CVE-2025-30269Shared CWE-134
CVE-2025-68648Shared CWE-134
CVE-2025-64157Shared CWE-134

References