Skip to main content
Mallory
Low

OS Command Injection in ExifTool SetMacOSTags on macOS

CVE-2026-3102 is an OS command injection vulnerability in ExifTool affecting macOS in versions 13.49 and earlier. The flaw is in the SetMacOSTags function in lib/Image/ExifTool/MacOS.pm, reached during handling of macOS file creation date metadata in the PNG file parser workflow. A user-controlled metadata value, described in the reporting as a tainted DateTimeOriginal value later copied into FileCreateDate/MDItemFSCreationDate, is passed unsafely into a system command that invokes /usr/bin/setfile. Because the date value is not properly sanitized before shell execution, an attacker can embed shell metacharacters such as single quotes in image metadata and cause arbitrary command execution when ExifTool processes the crafted file on macOS. Public reporting indicates exploitation is facilitated by using the -n flag to bypass normal date conversion/validation and the -tagsFromFile feature to copy a permissive source tag such as DateTimeOriginal into the vulnerable FileCreateDate path.

Share:
Stay ahead

Get ahead of vulnerabilities like this

Mallory continuously monitors global threat intelligence and correlates it with your attack surface — so you know if you’re exposed before adversaries strike.

ANALYST BRIEF

Impact, mitigation & remediation

What it means. What to do now. For analysts and engineers who need to decide and keep moving.

Impact

What an attacker gets — and what they’ve been doing with it.

Successful exploitation results in arbitrary shell command execution on the affected macOS host with the privileges of the user running ExifTool. This can enable remote compromise in workflows that automatically process attacker-supplied images, including execution of follow-on payloads, Trojan or infostealer deployment, data theft, and establishment of an initial foothold for further lateral movement. The image itself may appear benign while the malicious payload is carried in metadata.

Mitigation

If you can’t patch tonight, do this now.

Until patching is complete, avoid processing untrusted image files with ExifTool on macOS, especially in automated ingestion or metadata-copy workflows. Disable or restrict use of vulnerable workflows involving -n and metadata copying from untrusted files where operationally possible. Run ExifTool in isolated or sandboxed environments, under low-privilege accounts, and with restricted network access. Identify and isolate systems such as DAM, newsroom, forensic, legal, or medical imaging pipelines that may silently process externally sourced images.

Remediation

Patch, then assume compromise.

Upgrade ExifTool to version 13.50 or later. The upstream fix replaces fragile string-based system command construction with safer argument-list-based execution via a dedicated wrapper, removing shell interpretation of attacker-controlled metadata. Where relevant, apply upstream patch commit e9609a9bcc0d32bd252a709a562fb822d6dd86f7. Also audit third-party applications, scripts, and embedded ExifTool copies on macOS to ensure they are updated to a non-vulnerable version.
PUBLIC EXPLOITS

Exploits

No public exploits tracked yet. Mallory keeps watching.

VALID 0 / 0 TOTALView all

No public exploit code observed for this vulnerability.

EXPOSURE SURFACE

Affected products & vendors

Products and vendors Mallory has correlated with this vulnerability. Open in Mallory to drill down to specific CPE configurations and version ranges.

VendorProductType
Exiftool ProjectExiftoolapplication

Vendor-confirmed product mapping. Mallory continuously reconciles against your asset inventory in the product.

ACTIVITY FEED

Recent activity

31 sources tracked across advisories, community write-ups, and news. Mallory keeps watching after this page renders.

31 SOURCESView all
cyber security newsNews
May 20, 2026
Critical ExifTool Vulnerability Allows Attackers to Compromise Macs via Single Malicious Image

A command injection vulnerability in ExifTool on macOS that allows arbitrary shell command execution via malicious image metadata processed through FileCreateDate handling.

Read more
securelistNews
May 5, 2026
How a single image takes control of a Mac | Securelist

A command injection vulnerability in ExifTool on macOS that allows arbitrary shell command execution via crafted image metadata when using the -n / -printConv flag and copying metadata into FileCreateDate.

Read more
cyber security newsNews
Mar 9, 2026
Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

A critical macOS-focused remote code execution issue in ExifTool where malicious shell commands can be embedded in the EXIF DateTimeOriginal metadata field and executed when ExifTool is run with the -n/--printConv option, due to improper neutralization of OS command special elements (CWE-78).

Read more
cyber security newsNews
Mar 9, 2026
Critical ExifTool Flaw Lets Malicious Images Trigger Code Execution on macOS

A remote code execution vulnerability in ExifTool on macOS where malicious shell commands embedded in an image’s DateTimeOriginal metadata field can be executed when ExifTool is run with the -n/--printConv flag.

Read more
kaspersky blogNews
Mar 2, 2026
CVE-2026-3102: macOS ExifTool image-processing vulnerability | Kaspersky official blog

A critical command execution vulnerability in ExifTool on macOS where malicious shell commands embedded in image metadata (specifically an invalidly formatted DateTimeOriginal field) can be executed when processed under certain conditions (notably with the -n/--printConv flag enabled).

Read more
The operational view lives in Mallory

See the full picture, correlated to your attack surface.

This page covers what’s public. Mallory adds the parts that aren’t — which of your assets are affected, which threat actors are using it right now, which detections to deploy, and what to do next.
Exposure mapping

Query your assets running an affected version, and investigate the blast radius.

Threat actor evidence

Every observed campaign linking this CVE to a named adversary.

Associated malware2

Malware families riding this exploit, with evidence and IOCs.

Detection signatures

YARA, Sigma, Snort, and vendor rules — auto-deployed to your SIEM.

Vendor-by-vendor mapping

Cross-references every affected SKU, including bundled OEM variants.

Social activity26

Community discussion across Reddit, Mastodon, and other social sources.