ImageMagick has NULL Pointer Dereference in ClonePixelCacheRepository via crafted image
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in denial of service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in ImageMagick's ClonePixelCacheRepository allows a remote attacker to crash applications via a crafted image, leading to denial of service.
Vulnerability
Overview
A NULL pointer dereference vulnerability exists in the ClonePixelCacheRepository function of ImageMagick, a widely used open-source image processing suite. The root cause lies in the CloneImage function within MagickCore/image.c: when an image has zero columns or rows, CloneImage returns NULL after throwing a CorruptImageError exception. However, the calling function in MagickCore/transform.c (TransformImage) does not check for this NULL return before dereferencing the pointer, leading to a crash [1].
Exploitation
To exploit this vulnerability, a remote attacker only needs to supply a crafted image file that causes image->columns or image->rows to be zero. Any application or service linked against ImageMagick that processes user-supplied images is vulnerable. No authentication is required, and the attack can be triggered simply by the application attempting to transform or clone the malicious image [1][3].
Impact
Successful exploitation results in a denial of service (DoS) as the application or service crashes due to the NULL pointer dereference. This can disrupt operations for web applications, graphic design tools, and other systems relying on ImageMagick for image processing [1][3].
Mitigation
The vulnerability is patched in ImageMagick versions 7.1.2-15 and 6.9.13-40. Users should update to these patched versions immediately. No workarounds are documented, but following security best practices such as validating image dimensions before processing can help mitigate the risk [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x86NuGet | < 14.10.3 | 14.10.3 |
Affected products
2<= 7.1.2-15, <= 6.9.13-40+ 1 more
- (no CPE)range: <= 7.1.2-15, <= 6.9.13-40
- (no CPE)range: >= 7.0.0, < 7.1.2-15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-p863-5fgm-rgq4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25798ghsaADVISORY
- github.com/ImageMagick/ImageMagick/commit/e046417675d5c26e5f48816851a406c121c77469ghsaWEB
- github.com/ImageMagick/ImageMagick/issues/8567ghsaWEB
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-p863-5fgm-rgq4ghsax_refsource_CONFIRMWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.10.3ghsaWEB
News mentions
0No linked articles in our index yet.