Skip to content

Corel Presentation Exchange (.cmx)

.cmx file signature | application/octet-stream

Safe

Magic Bytes

Offset: 0
52 49 46 46

Corel Presentation Exchange (Corel 10 CMX) Metafile

Sources: Gary Kessler

Validation Code

How to validate .cmx files in Python

Python
def is_cmx(file_path: str) -> bool:
    """Check if file is a valid CMX by magic bytes."""
    signature = bytes([0x52, 0x49, 0x46, 0x46])
    with open(file_path, "rb") as f:
        return f.read(4) == signature

How to validate .cmx files in Node.js

Node.js
function isCMX(buffer: Buffer): boolean {
  const signature = Buffer.from([0x52, 0x49, 0x46, 0x46]);
  return buffer.subarray(0, 4).equals(signature);
}

How to validate .cmx files in Go

Go
func IsCMX(data []byte) bool {
    signature := []byte{0x52, 0x49, 0x46, 0x46}
    if len(data) < 4 {
        return false
    }
    return bytes.Equal(data[:4], signature)
}

API Endpoint

GET /api/v1/cmx
curl https://filesignature.org/api/v1/cmx

See the full API documentation for all endpoints and parameters.

Frequently Asked Questions

What is a .cmx file?

A .cmx file is a Corel Presentation Exchange file. Corel Presentation Exchange (Corel 10 CMX) Metafile

What are the magic bytes for .cmx files?

The magic bytes for Corel Presentation Exchange files are 52 49 46 46 at byte offset 0. These bytes uniquely identify the file format regardless of the file extension.

How do I validate a .cmx file?

To validate a .cmx file, read the first bytes of the file and compare them against the known magic bytes (52 49 46 46) at offset 0. This is more reliable than checking the file extension alone, as extensions can be renamed.

What is the MIME type for .cmx files?

There is no officially registered MIME type for .cmx files. Systems typically use application/octet-stream as a generic fallback when handling this format.

Is it safe to open .cmx files?

Corel Presentation Exchange (.cmx) files are generally safe to open. They are classified as low risk because they primarily contain data rather than executable code. However, always ensure files come from a trusted source.