Security Experts:

Connect with us

Hi, what are you looking for?



Unpatched Security Flaws Impact Corel Software Products

Researchers at Core Security have released details of unpatched vulnerabilities impacting a slew of products from Corel Software.

Researchers at Core Security have released details of unpatched vulnerabilities impacting a slew of products from Corel Software.

According to Core Security, the DLL hijacking vulnerabilities resides in: Corel DRAW, Corel Photo Paint X7, Corel PaintShop Pro X7, Corel CAD 2014, Corel Painter 2015, Corel PDF Fusion, Corel VideoStudio Pro X7 and Corel Fast Flick.

“When a file associated with the Corel software is opened, the directory of that document is first used to locate DLLs, which could allow an attacker to execute arbitrary commands by inserting malicious DLLs into the same directory as the document,” Core explained in an advisory.

If exploited successfully, the vulnerabilities could be used by attackers to execute code. 

According to Core Security, the firm attempted to notify Corel Software of the vulnerabilities in December, and decided to publish the advisory after not receiving any acknowledgement from the vendor.  

“Users can determine if they are potentially vulnerable only by checking if they have installed the affected software,” noted Joaquin Rodriguez Varela, senior security researcher at Core Security. “Taking into account that this is a user release, this vulnerability affects the latest versions of the product and there is no fix available. We recommend vulnerable users refrain from opening suspicious files whose extensions are associated with any of these applications, and if they must, ensure that there aren’t any of the DLL files (hidden as well) listed in the advisory in the same folder.”

In a statement to SecurityWeek, Corel Software said it is reviewing its products “on a case-by-case basis to safeguard dynamic loading of DLL files, which is a common vulnerability in many Windows applications.”

Corel makes frequent updates to our applications and these changes have been made a priority for the next update of any affected Corel product,” the company said. “We would like to assure our users that we are not aware of any exploits of this issue with our software. Corel would like to remind all of its customers to follow safe internet practices and not open attachments, click on external links, download files, or visit an untrusted remote file system from any source they do not know and trust explicitly. Moreover, it is also a best practice to ensure that your system is running up-to-date anti-virus, firewall and malware protection software.”

*This story was updated to add commentary from Corel Software. 

Written By

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.