
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical heap-based buffer overflow vulnerability (CVE-2025-2338) was discovered in tbeu matio version 1.5.28. The vulnerability affects the strdup_vprintf function in src/io.c. This security issue was disclosed on February 27, 2025, and allows remote attackers to potentially execute arbitrary code (Github Issue).
The vulnerability is classified as a heap-based buffer overflow (CWE-122) that occurs in the strdup_vprintf function at line 67 of src/io.c. When processing certain files, the function performs an out-of-bounds read of size 149 bytes beyond a 200-byte allocated region, which can lead to a buffer overflow condition. The issue manifests during the execution of post-processing logic and can be triggered through specially crafted input files (Github Issue).
The vulnerability can lead to heap-based buffer overflow, potentially resulting in application crashes and arbitrary code execution. The issue can be triggered remotely, making it particularly severe for systems processing untrusted input files (Github Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."