CVE-2025-10921

7.8 HIGH

📋 TL;DR

A heap-based buffer overflow vulnerability in GIMP's HDR file parser allows remote attackers to execute arbitrary code when users open malicious HDR files. This affects all GIMP installations that process HDR files, potentially compromising user systems. Attackers can achieve remote code execution in the context of the current user.

💻 Affected Systems

Products:
  • GIMP (GNU Image Manipulation Program)
Versions: Versions prior to GIMP 2.10.40 and 3.0.0
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All GIMP installations with HDR file support enabled are vulnerable by default when processing HDR files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via remote code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing GIMP.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but HDR files can be distributed via websites, email, or downloads.
🏢 Internal Only: MEDIUM - Internal users could be tricked into opening malicious HDR files via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious HDR file. The vulnerability is publicly disclosed with technical details available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GIMP 2.10.40 and 3.0.0

Vendor Advisory: https://gitlab.gnome.org/GNOME/gegl/-/commit/0e68b7471dabf2800d780819c19bd5e6462f565f

Restart Required: Yes

Instructions:

1. Update GIMP to version 2.10.40 or 3.0.0 using your distribution's package manager. 2. For Linux: sudo apt update && sudo apt upgrade gimp (Debian/Ubuntu) or sudo yum update gimp (RHEL/CentOS). 3. For Windows/macOS: Download latest version from gimp.org. 4. Restart GIMP after installation.

🔧 Temporary Workarounds

Disable HDR file support

all

Remove or disable HDR file format support in GIMP to prevent parsing of malicious files

# Remove HDR plugin file (location varies by OS)
# Linux: rm /usr/lib/gimp/2.0/plug-ins/file-hdr
# Windows: Delete file-hdr.exe from GIMP plugins directory

Use application sandboxing

linux/windows

Run GIMP in a sandboxed environment to limit impact of potential exploitation

# Linux using Firejail: firejail gimp
# Windows using Sandboxie: Configure GIMP to run in sandbox

🧯 If You Can't Patch

  • Implement strict file type filtering to block HDR files at email gateways and web proxies
  • Educate users to never open HDR files from untrusted sources and disable automatic file opening

🔍 How to Verify

Check if Vulnerable:

Check GIMP version: gimp --version. If version is below 2.10.40, system is vulnerable.

Check Version:

gimp --version

Verify Fix Applied:

Verify GIMP version is 2.10.40 or higher: gimp --version. Test opening a legitimate HDR file to ensure functionality remains.

📡 Detection & Monitoring

Log Indicators:

  • GIMP crash logs with memory access violations
  • Unexpected child processes spawned from GIMP
  • Network connections initiated by GIMP process

Network Indicators:

  • Outbound connections from GIMP to unknown IPs
  • DNS queries for command and control domains from GIMP process

SIEM Query:

process_name:"gimp" AND (event_id:"1000" OR event_id:"1001") OR process_parent_name:"gimp" AND process_name NOT IN ("gimp", known_legitimate_processes)

🔗 References

📤 Share & Export