VYPR
Moderate severityNVD Advisory· Published Feb 24, 2026· Updated Feb 26, 2026

ImageMagick: Converting multi-layer nested MVG to SVG can cause DoS

CVE-2026-24484

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ImageMagick fails to check for multi-layer nested MVG conversions to SVG, leading to a denial of service (DoS) in versions prior to 7.1.2-15 and 6.9.13-40.

Vulnerability

Overview

CVE-2026-24484 is a denial-of-service (DoS) vulnerability in ImageMagick, a widely used open-source image processing suite. The issue resides in the MVG (Magick Vector Graphics) to SVG (Scalable Vector Graphics) conversion path. Prior to versions 7.1.2-15 and 6.9.13-40 and 7.1.2-15, the software fails to properly validate or limit the depth of nested MVG layers during conversion, allowing an attacker to craft a malicious MVG file that triggers excessive resource consumption [2][4].

Exploitation

Details

An attacker can exploit this vulnerability by supplying a specially crafted MVG image containing deeply nested layers. When ImageMagick processes this file—either through direct command-line use or via an application that relies on the library—the conversion routine enters a state of uncontrolled recursion or resource allocation, leading to a denial of service. No authentication or special privileges are required; the attack can be triggered remotely if the application accepts user-uploaded images [4].

Impact

Successful exploitation results in a denial of service, causing the ImageMagick process to hang, crash, or consume excessive CPU and memory resources. This can disrupt services that depend on ImageMagick for image processing, such as web applications, content management systems, or automated image pipelines [2][4].

Mitigation

The vulnerability has been patched in ImageMagick versions 7.1.2-15 and 6.9.13-40. Users are strongly advised to update to these or later releases. For those unable to upgrade immediately, implementing a security policy that restricts or disables MVG conversion may serve as a temporary workaround [1][2][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x86NuGet
< 14.10.314.10.3
Magick.NET-Q8-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x86NuGet
< 14.10.314.10.3

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-15, <6.9.13-40+ 1 more
    • (no CPE)range: <7.1.2-15, <6.9.13-40
    • (no CPE)range: >= 7.0.0, < 7.1.2-15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.