VideoLAN, a project and a non-profit organization.

Security Bulletin VLC 3.0.22

Summary           : Multiple vulnerabilities fixed in VLC media player
Date              : December 2025
Affected versions : VLC media player 3.0.21 and earlier
ID                : VideoLAN-SB-VLC-3022
CVE references    : CVE-2025-51602

Details

A denial of service could be triggered with maliciously crafted files or streams.

Impact

If successful, a malicious third party could trigger a crash of VLC (Denial of service).

While these issues in themselves are most likely to just crash the application, we can't exclude that they could be combined to leak user information or remotely execute code. ASLR and DEP help reduce the likeliness of code execution, but may be bypassed.

We have not seen exploits performing code execution through these vulnerabilies.

Threat mitigation

Exploitation of this issue requires the user to explicitly open a maliciously crafted file or stream.

Workarounds

The user should refrain from opening files or streams from untrusted sources (and disable the VLC browser plugins), until the patch is applied.

Solution

VLC media player 3.0.22 addresses these issues.

Credits

References

The VideoLAN project
https://www.videolan.org/
VLC official Git repository
https://code.videolan.org/videolan/vlc.git