Critical ExifTool Vulnerability Enables Malicious Image RCE on MacOS
A new security flaw in the popular ExifTool software lets attackers run harmful code on Macs just by opening a tricked-out image file. This vulnerability, CVE-2026-3102, puts users at risk if they process photos with older versions of the tool.
ExifTool is a free tool that reads and edits hidden data inside images, like when a photo was taken or where it was snapped. Photographers, newsrooms, and forensics teams use it every day to handle metadata in files from JPEGs to medical scans.​
Many apps and scripts rely on ExifTool behind the scenes for sorting photos or pulling details. It’s powerful because it works with hundreds of file types, but that reach makes flaws like this one dangerous.​
How the ExifTool Vulnerability Works
Security Team found out CVE-2026-3102, which hits ExifTool versions up to 13.49 on macOS. Attackers hide evil shell commands in the DateTimeOriginal metadata field of an image, using a bad date format to slip them past checks. Said by Kaspersky.
On Macs, when ExifTool processes the file with the “-n” flag for raw output, it runs those commands. This lets hackers download malware or steal data without the user noticing anything wrong with the picture itself.
Think of a news editor getting a “hot” photo via email. Their software scans it automatically, and boom, the Mac is infected while the image looks fine.​
| Detail | Info |
|---|---|
| CVE ID | CVE-2026-3102​ |
| Affected Tool | ExifTool ≤ 13.49​ |
| Platforms | macOS​ |
| Type | Remote Code Execution (RCE)​ |
| CVSS Score | 8.8 (High)​ |
| Fix | Update to 13.50​ |
Real World Risks
This isn’t some lab trick; it’s built for sneaky attacks. A forensics lab or media firm might process a bait image from a shady source. Their digital asset system kicks in, runs ExifTool, and malware spreads quietly.
No user action needed beyond opening the file in a vulnerable setup. Since Macs power creative workflows, anyone tweaking photos could get hit, from hobbyists to big publishers.​
How to Stay Safe
Update ExifTool to version 13.50 right away, its creator fixed this fast. Check apps like photo organizers or scripts; they might bundle old copies.​
Run risky files in a sandbox or virtual machine. Skip the “-n” flag unless needed, and watch for updates on open-source tools you use.​
Why This Matters Now
People think Macs dodge malware, but holes like CVE-2026-3102 prove otherwise. With images everywhere in work and play, this flaw could touch millions quietly.
ExifTool’s everywhere in Pro Tools, so scan your setup. Quick updates block hackers from turning innocent photos into weapons.