IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attackers can deliver a crafted URL via a browser that passes unvalidated mpv_options/input-commands parameters into the mpv runtime, causing arbitrary command execution as the current macOS user upon approval of the browser protocol prompt without requiring a valid media file.
Metrics
Affected Vendors & Products
References
History
Thu, 21 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attackers can deliver a crafted URL via a browser that passes unvalidated mpv_options/input-commands parameters into the mpv runtime, causing arbitrary command execution as the current macOS user upon approval of the browser protocol prompt without requiring a valid media file. | |
| Title | IINA < 1.4.3 Command Execution via iina://open URL Scheme | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-21T19:36:05.859Z
Reserved: 2026-05-18T19:22:26.749Z
Link: CVE-2026-47114
No data.
Status : Deferred
Published: 2026-05-21T20:16:14.340
Modified: 2026-05-21T21:03:56.320
Link: CVE-2026-47114
No data.
OpenCVE Enrichment
Updated: 2026-05-21T20:30:18Z