CVE-2026-41254
Published: 18 April 2026
Summary
CVE-2026-41254 is a medium-severity Incorrect Behavior Order (CWE-696) vulnerability in Littlecms Little Cms. Its CVSS base score is 4.0 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 8.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and RA-5 (Vulnerability Monitoring and Scanning).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires timely remediation of the integer overflow flaw in lcms2 by installing available patches from the GitHub commits.
Enables identification of systems with vulnerable lcms2 versions through regular vulnerability scanning for CVE-2026-41254.
Provides memory protections like ASLR and DEP that mitigate potential exploitation of the integer overflow leading to information disclosure or DoS.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Integer overflow in local library function enables exploitation for partial denial of service via application or system exploitation.
NVD Description
Little CMS (lcms2) through 2.18 has an integer overflow in CubeSize in cmslut.c because the overflow check is performed after the multiplication.
Deeper analysisAI
CVE-2026-41254 is an integer overflow vulnerability in the CubeSize function within cmslut.c in Little CMS (lcms2) versions through 2.18. The flaw occurs because the overflow check is performed after the multiplication, potentially allowing incorrect handling of large values (associated with CWE-696 and CWE-190). The vulnerability was published on 2026-04-18 with a CVSS v3.1 base score of 4.0.
The vulnerability requires local access (AV:L) and high attack complexity (AC:H) to exploit, with no privileges (PR:N), no user interaction (UI:N), and unchanged scope (S:U). A successful attack could lead to low-impact confidentiality loss, such as limited information disclosure, and low-impact availability disruption, such as a partial denial of service.
Patches addressing the issue are available in the Little-CMS GitHub repository via commits da6110b1d14abc394633a388209abd5ebedd7ab0 and e0641b1828d0a1af5ecb1b11fe22f24fceefd4bc. Additional details on mitigation and the vulnerability are provided in the GitHub Security Advisory at GHSA-4xp6-rcgg-m9qq, a technical analysis at https://abhinavagarwal07.github.io/posts/lcms2-cubesize-overflow/, and an announcement on the oss-security mailing list at https://www.openwall.com/lists/oss-security/2026/04/17/16.
Details
- CWE(s)