CVE-2026-47114 PUBLISHED

IINA < 1.4.3 Command Execution via iina://open URL Scheme

Assigner: VulnCheck
Reserved: 18.05.2026 Published: 21.05.2026 Updated: 22.05.2026

IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attackers can deliver a crafted URL via a browser that passes unvalidated mpv_options/input-commands parameters into the mpv runtime, causing arbitrary command execution as the current macOS user upon approval of the browser protocol prompt without requiring a valid media file.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS Score: 8.6

Product Status

Vendor iina
Product iina
Versions Default: affected
  • affected from 0 to 1.4.3 (excl.)

Credits

  • stackpointer finder

References

Problem Types

  • Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') CWE