CVE-2026-25797

NameCVE-2026-25797
DescriptionImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicous file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
imagemagick (PTS)bullseye8:6.9.11.60+dfsg-1.3+deb11u4vulnerable
bullseye (security)8:6.9.11.60+dfsg-1.3+deb11u9vulnerable
bookworm8:6.9.11.60+dfsg-1.6+deb12u5vulnerable
bookworm (security)8:6.9.11.60+dfsg-1.6+deb12u6vulnerable
trixie8:7.1.1.43+dfsg1-1+deb13u4vulnerable
trixie (security)8:7.1.1.43+dfsg1-1+deb13u5vulnerable
forky, sid8:7.1.2.13+dfsg1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
imagemagicksource(unstable)(unfixed)

Notes

https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-rw6c-xp26-225v
Fixed by: https://github.com/ImageMagick/ImageMagick/commit/26088a83d71e9daa203d54a56fe3c31f3f85463d (7.1.2-14)
Fixed by: https://github.com/ImageMagick/ImageMagick/commit/81129f79ad622ff4c1d729828a34ab0f49ec89f6 (7.1.2-14)
Fixed by: https://github.com/ImageMagick/ImageMagick6/commit/7284564901441ddb04dadaad306e9f0fb527d71f (6.9.13-39)

Search for package or bug name: Reporting problems