CVE-2026-25794

8.2 HIGH

📋 TL;DR

This vulnerability in ImageMagick allows attackers to trigger an integer overflow when processing large UHDR images, leading to heap buffer overflow and potential arbitrary code execution. Any system using vulnerable ImageMagick versions to process untrusted image files is affected, particularly web applications that accept image uploads.

💻 Affected Systems

Products:
  • ImageMagick
Versions: All versions prior to 7.1.2-15
Operating Systems: All platforms running ImageMagick
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing UHDR format images with large dimensions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crashes (denial of service) or memory corruption that could be leveraged for information disclosure.

🟢

If Mitigated

Denial of service only if proper sandboxing prevents code execution.

🌐 Internet-Facing: HIGH - Web applications accepting image uploads are directly exposed.
🏢 Internal Only: MEDIUM - Internal systems processing user-uploaded images remain vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious UHDR images; no public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.1.2-15

Vendor Advisory: https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-vhqj-f5cj-9x8h

Restart Required: No

Instructions:

1. Update ImageMagick to version 7.1.2-15 or later using your package manager. 2. For Linux: 'sudo apt update && sudo apt upgrade imagemagick' (Debian/Ubuntu) or 'sudo yum update imagemagick' (RHEL/CentOS). 3. Verify installation with 'convert --version'.

🔧 Temporary Workarounds

Disable UHDR coder

linux

Remove UHDR format support from ImageMagick policy configuration

Edit /etc/ImageMagick-7/policy.xml and add: <policy domain="coder" rights="none" pattern="UHDR" />

Image size limits

linux

Limit maximum image dimensions in ImageMagick configuration

Edit /etc/ImageMagick-7/policy.xml and add: <policy domain="resource" name="width" value="8192"/> <policy domain="resource" name="height" value="8192"/>

🧯 If You Can't Patch

  • Implement strict input validation to reject UHDR format images entirely
  • Run ImageMagick in sandboxed containers with minimal privileges

🔍 How to Verify

Check if Vulnerable:

Run 'convert --version' and check if version is below 7.1.2-15

Check Version:

convert --version | head -1

Verify Fix Applied:

Confirm version is 7.1.2-15 or higher with 'convert --version'

📡 Detection & Monitoring

Log Indicators:

  • ImageMagick process crashes
  • Segmentation faults in application logs
  • Failed UHDR image processing

Network Indicators:

  • Unusual UHDR file uploads to web applications

SIEM Query:

process.name:"convert" AND event.action:"segmentation fault"

🔗 References

📤 Share & Export