VYPR
Low severityNVD Advisory· Published Jul 14, 2025· Updated Nov 3, 2025

ImageMagick has Heap Buffer Overflow in InterpretImageFilename

CVE-2025-53014

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the InterpretImageFilename function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (%%). Versions 7.1.2-0 and 6.9.13-26 fix the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ImageMagick versions before 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in InterpretImageFilename due to an off-by-one error when processing successive percent signs.

ImageMagick [1] is a widely used open-source software suite for image manipulation. CVE-2025-53014 describes a heap buffer overflow in the InterpretImageFilename function. The root cause is an off-by-one error that leads to out-of-bounds memory access when format strings containing consecutive percent signs (%%) are processed [2][3].

An attacker can trigger this vulnerability by supplying a malicious filename containing %% to ImageMagick via command-line tools or API calls that invoke InterpretImageFilename. No authentication is required if the attacker can provide input to the application [3].

Successful exploitation could result in reading out-of-bounds heap memory, potentially leading to information disclosure or a crash. Under controlled heap conditions, arbitrary code execution may be possible [2][3].

The issue is patched in ImageMagick versions 7.1.2-0 and 6.9.13-26 [4]. Users are strongly advised to upgrade to these versions. No workarounds are available [3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.7.014.7.0
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.7.014.7.0
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.7.014.7.0
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.7.014.7.0
Magick.NET-Q16-HDRI-arm64NuGet
< 14.7.014.7.0
Magick.NET-Q16-HDRI-x64NuGet
< 14.7.014.7.0
Magick.NET-Q16-HDRI-x86NuGet
< 14.7.014.7.0
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.7.014.7.0
Magick.NET-Q16-OpenMP-x64NuGet
< 14.7.014.7.0
Magick.NET-Q16-arm64NuGet
< 14.7.014.7.0
Magick.NET-Q16-x64NuGet
< 14.7.014.7.0
Magick.NET-Q16-x86NuGet
< 14.7.014.7.0
Magick.NET-Q8-AnyCPUNuGet
< 14.7.014.7.0
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.7.014.7.0
Magick.NET-Q8-OpenMP-x64NuGet
< 14.7.014.7.0
Magick.NET-Q8-arm64NuGet
< 14.7.014.7.0
Magick.NET-Q8-x64NuGet
< 14.7.014.7.0
Magick.NET-Q8-x86NuGet
< 14.7.014.7.0

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-0, <6.9.13-26+ 1 more
    • (no CPE)range: <7.1.2-0, <6.9.13-26
    • (no CPE)range: < 7.1.2-0

Patches

1
79b6ed037707

Correct possible out of bounds read of a single byte.

https://github.com/ImageMagick/ImageMagick6Dirk LemstraJun 26, 2025via ghsa
1 file changed · +1 1
  • magick/image.c+1 1 modified
    @@ -1690,7 +1690,7 @@ MagickExport size_t InterpretImageFilename(const ImageInfo *image_info,
         q=(char *) p+1;
         if (*q == '%')
           {
    -        p=q+1;
    +        p++;
             continue;
           }
         field_width=0;
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.