CVE-2026-24485

7.5 HIGH

📋 TL;DR

This vulnerability in ImageMagick allows attackers to cause denial of service by exploiting an infinite loop in PCD file processing. When ImageMagick processes a specially crafted PCD file without a valid Sync marker, it becomes unresponsive and consumes all CPU resources. This affects all systems running vulnerable versions of ImageMagick that process untrusted image files.

💻 Affected Systems

Products:
  • ImageMagick
  • Magick.NET
  • Any software using ImageMagick libraries
Versions: ImageMagick versions prior to 7.1.2-15 and 6.9.13-40
Operating Systems: All operating systems running vulnerable ImageMagick versions
Default Config Vulnerable: ⚠️ Yes
Notes: Any application that uses ImageMagick to process PCD files is vulnerable. This includes web applications with image upload functionality, document processing systems, and media servers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system resource exhaustion leading to system crash or unavailability of services dependent on ImageMagick processing.

🟠

Likely Case

Denial of service affecting the ImageMagick process and potentially related services, requiring process termination and system intervention.

🟢

If Mitigated

Limited impact to isolated processes with proper resource limits and monitoring in place.

🌐 Internet-Facing: HIGH - ImageMagick is commonly used in web applications for image processing, making internet-facing systems vulnerable to DoS attacks via file uploads.
🏢 Internal Only: MEDIUM - Internal systems processing user-uploaded images or automated image processing workflows could be affected.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only a specially crafted PCD file. No authentication or special privileges needed if the system processes untrusted image files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ImageMagick 7.1.2-15 and 6.9.13-40, Magick.NET 14.10.3

Vendor Advisory: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-pqgj-2p96-rx85

Restart Required: Yes

Instructions:

1. Update ImageMagick to version 7.1.2-15 or 6.9.13-40. 2. For Magick.NET, update to version 14.10.3. 3. Restart all services and applications using ImageMagick libraries. 4. Verify the update with 'convert --version' or 'magick --version'.

🔧 Temporary Workarounds

Disable PCD format support

all

Remove or disable PCD file format support in ImageMagick configuration

Edit policy.xml: <policy domain="coder" rights="none" pattern="PCD" />

Implement resource limits

linux

Set CPU and memory limits for ImageMagick processes

ulimit -t 30 (limits CPU time to 30 seconds)
docker run --cpus="0.5" --memory="512m" ...

🧯 If You Can't Patch

  • Implement strict input validation to reject or sanitize PCD files before processing
  • Isolate ImageMagick processing in containers with strict resource limits and monitoring

🔍 How to Verify

Check if Vulnerable:

Check ImageMagick version: 'convert --version' or 'magick --version'. If version is below 7.1.2-15 (for ImageMagick 7) or below 6.9.13-40 (for ImageMagick 6), system is vulnerable.

Check Version:

convert --version 2>/dev/null || magick --version 2>/dev/null || echo "ImageMagick not found"

Verify Fix Applied:

After patching, verify version meets minimum requirements and test processing of known safe PCD files to ensure normal operation.

📡 Detection & Monitoring

Log Indicators:

  • High CPU usage by ImageMagick processes
  • Processes stuck in 'D' (uninterruptible sleep) state
  • Repeated timeouts in image processing services

Network Indicators:

  • Increased failed image processing requests
  • Service degradation in applications using image processing

SIEM Query:

process.name:"convert" OR process.name:"magick" AND (cpu.usage > 90% FOR 5m) OR process.state:"D"

🔗 References

📤 Share & Export