Vulnerability Details CVE-2026-22190
Panda3D versions up to and including 1.10.16 egg-mkfont contains an uncontrolled format string vulnerability. The -gp (glyph pattern) command-line option is used directly as the format string for sprintf() with only a single argument supplied. If an attacker provides additional format specifiers, egg-mkfont may read unintended stack values and write the formatted output into generated .egg and .png files, resulting in disclosure of stack-resident memory and pointer values.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 1.9%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2026-22190
-
cpe:2.3:a:cmu:panda3d:1.10.0
-
cpe:2.3:a:cmu:panda3d:1.10.1
-
cpe:2.3:a:cmu:panda3d:1.10.10
-
cpe:2.3:a:cmu:panda3d:1.10.11
-
cpe:2.3:a:cmu:panda3d:1.10.12
-
cpe:2.3:a:cmu:panda3d:1.10.13
-
cpe:2.3:a:cmu:panda3d:1.10.14
-
cpe:2.3:a:cmu:panda3d:1.10.15
-
cpe:2.3:a:cmu:panda3d:1.10.16
-
cpe:2.3:a:cmu:panda3d:1.10.2
-
cpe:2.3:a:cmu:panda3d:1.10.3
-
cpe:2.3:a:cmu:panda3d:1.10.4
-
cpe:2.3:a:cmu:panda3d:1.10.4.1
-
cpe:2.3:a:cmu:panda3d:1.10.5
-
cpe:2.3:a:cmu:panda3d:1.10.6
-
cpe:2.3:a:cmu:panda3d:1.10.7
-
cpe:2.3:a:cmu:panda3d:1.10.8
-
cpe:2.3:a:cmu:panda3d:1.10.9
-
cpe:2.3:a:cmu:panda3d:1.8.0
-
cpe:2.3:a:cmu:panda3d:1.9.0
-
cpe:2.3:a:cmu:panda3d:1.9.1
-
cpe:2.3:a:cmu:panda3d:1.9.2
-
cpe:2.3:a:cmu:panda3d:1.9.3
-
cpe:2.3:a:cmu:panda3d:1.9.4