ImageMagick has Heap Buffer Overflow in InterpretImageFilename
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in the InterpretImageFilename function. The issue stems from an off-by-one error that causes out-of-bounds memory access when processing format strings containing consecutive percent signs (%%). Versions 7.1.2-0 and 6.9.13-26 fix the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImageMagick versions before 7.1.2-0 and 6.9.13-26 have a heap buffer overflow in InterpretImageFilename due to an off-by-one error when processing successive percent signs.
ImageMagick [1] is a widely used open-source software suite for image manipulation. CVE-2025-53014 describes a heap buffer overflow in the InterpretImageFilename function. The root cause is an off-by-one error that leads to out-of-bounds memory access when format strings containing consecutive percent signs (%%) are processed [2][3].
An attacker can trigger this vulnerability by supplying a malicious filename containing %% to ImageMagick via command-line tools or API calls that invoke InterpretImageFilename. No authentication is required if the attacker can provide input to the application [3].
Successful exploitation could result in reading out-of-bounds heap memory, potentially leading to information disclosure or a crash. Under controlled heap conditions, arbitrary code execution may be possible [2][3].
The issue is patched in ImageMagick versions 7.1.2-0 and 6.9.13-26 [4]. Users are strongly advised to upgrade to these versions. No workarounds are available [3].
- GitHub - ImageMagick/ImageMagick: ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, scripting, and integration across platforms.
- NVD - CVE-2025-53014
- Heap Buffer Overflow in InterpretImageFilename
- Correct out of bounds read of a single byte. · ImageMagick/ImageMagick@29d8272
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-arm64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-x64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q16-x86NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q8-AnyCPUNuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q8-arm64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q8-x64NuGet | < 14.7.0 | 14.7.0 |
Magick.NET-Q8-x86NuGet | < 14.7.0 | 14.7.0 |
Affected products
2<7.1.2-0, <6.9.13-26+ 1 more
- (no CPE)range: <7.1.2-0, <6.9.13-26
- (no CPE)range: < 7.1.2-0
Patches
179b6ed037707Correct possible out of bounds read of a single byte.
1 file changed · +1 −1
magick/image.c+1 −1 modified@@ -1690,7 +1690,7 @@ MagickExport size_t InterpretImageFilename(const ImageInfo *image_info, q=(char *) p+1; if (*q == '%') { - p=q+1; + p++; continue; } field_width=0;
Vulnerability mechanics
Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
7- github.com/advisories/GHSA-hm4x-r5hc-794fghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-53014ghsaADVISORY
- github.com/ImageMagick/ImageMagick/commit/29d82726c7ec20c07c49ba263bdcea16c2618e03ghsaWEB
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-hm4x-r5hc-794fghsax_refsource_CONFIRMWEB
- github.com/ImageMagick/ImageMagick6/commit/79b6ed03770781d996d1710b89fbb887e5ea758aghsaWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.7.0ghsaWEB
- lists.debian.org/debian-lts-announce/2025/09/msg00012.htmlghsaWEB
News mentions
0No linked articles in our index yet.