CVE-2025-55154

8.8 HIGH

📋 TL;DR

This vulnerability in ImageMagick allows integer overflow during PNG/MNG image processing, leading to memory corruption. Attackers can exploit this by crafting malicious images to potentially execute arbitrary code or cause denial of service. Any system using vulnerable ImageMagick versions to process untrusted images is affected.

💻 Affected Systems

Products:
  • ImageMagick
Versions: All versions before 6.9.13-27 and 7.1.2-1
Operating Systems: All operating systems running vulnerable ImageMagick versions
Default Config Vulnerable: ⚠️ Yes
Notes: Any application or service using ImageMagick to process PNG/MNG images is vulnerable, including web applications, document processors, and image conversion tools.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the ImageMagick process, potentially leading to full system compromise.

🟠

Likely Case

Denial of service through application crashes or memory corruption leading to unstable behavior.

🟢

If Mitigated

Limited impact if proper input validation and sandboxing are implemented, though crashes may still occur.

🌐 Internet-Facing: HIGH - Web applications processing user-uploaded images are directly exposed.
🏢 Internal Only: MEDIUM - Internal systems processing images from untrusted sources remain vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a malicious PNG/MNG image file, but no public proof-of-concept has been released yet.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.9.13-27 or 7.1.2-1

Vendor Advisory: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp29-wxp5-wh82

Restart Required: Yes

Instructions:

1. Identify ImageMagick version using 'convert --version' or 'magick --version'. 2. Update via package manager: 'apt update && apt upgrade imagemagick' (Debian/Ubuntu) or 'yum update imagemagick' (RHEL/CentOS). 3. Restart any services using ImageMagick. 4. Verify update with version check.

🔧 Temporary Workarounds

Disable PNG/MNG processing

all

Remove PNG and MNG support from ImageMagick policy.xml to prevent processing of vulnerable formats

Edit /etc/ImageMagick-6/policy.xml or /etc/ImageMagick-7/policy.xml
Add: <policy domain="coder" rights="none" pattern="PNG" />
Add: <policy domain="coder" rights="none" pattern="MNG" />

🧯 If You Can't Patch

  • Implement strict input validation to reject suspicious PNG/MNG files before processing
  • Run ImageMagick in a sandboxed environment with limited privileges and resource constraints

🔍 How to Verify

Check if Vulnerable:

Run 'convert --version' or 'magick --version' and check if version is below 6.9.13-27 (for ImageMagick 6) or below 7.1.2-1 (for ImageMagick 7)

Check Version:

convert --version 2>/dev/null || magick --version 2>/dev/null

Verify Fix Applied:

Confirm version is 6.9.13-27 or higher (ImageMagick 6) or 7.1.2-1 or higher (ImageMagick 7) using version check command

📡 Detection & Monitoring

Log Indicators:

  • ImageMagick process crashes or segmentation faults
  • Unusual memory usage patterns in image processing services
  • Failed image conversion attempts with specific PNG/MNG files

Network Indicators:

  • Unusually large PNG/MNG file uploads to web applications
  • Multiple failed image processing requests from single source

SIEM Query:

source="*imagemagick*" AND (event="segmentation fault" OR event="crash" OR memory_usage>threshold)

🔗 References

📤 Share & Export