VYPR
Moderate severityNVD Advisory· Published Feb 24, 2026· Updated Feb 26, 2026

ImageMagick has Division-by-Zero in YUV sampling factor validation, which leads to crash

CVE-2026-25799

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A logic error in ImageMagick's YUV sampling factor validation causes a division-by-zero when loading specially crafted images, leading to denial of service via application crash.

Root

Cause

A logic error in YUV sampling factor validation can allow an invalid sampling factor to bypass the intended checks, triggering a division-by-zero at line 210 of coders/yuv.c during image processing. This flaw is present in ImageMagick versions prior to 7.1.2-15 and 6.9.13-40 [2][4].

Attack

Vector & Exploitation

The vulnerability is exploitable when ImageMagick attempts to load a specially crafted image that supplies an invalid YUV sampling factor. No authentication is required; the attack surface is the image loading functionality accessible via the command-line tool or any application using the ImageMagick library to process untrusted image files. A crafted image file is sufficient to trigger the crash [4].

Impact

Successful exploitation leads to a reliable denial-of-service condition by crashing the ImageMagick process. The division-by-zero produces a fatal signal, terminating the process and preventing legitimate image processing tasks. This can be particularly impactful for services and applications that rely on ImageMagick for automated image handling, such as web applications, graphic design tools, and scientific image pipelines [1][2].

Mitigation

ImageMagick has addressed this vulnerability in versions 7.1.2-15 and 6.9.13-40. Users should upgrade to these patched versions or apply the available patch to their current installation. No workarounds are documented; however, limiting exposure by restricting the handling of untrusted image files can reduce risk until an upgrade is possible [2][3].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x86NuGet
< 14.10.314.10.3
Magick.NET-Q8-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x86NuGet
< 14.10.314.10.3

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-15, <6.9.13-40+ 1 more
    • (no CPE)range: <7.1.2-15, <6.9.13-40
    • (no CPE)range: >= 7.0.0, < 7.1.2-15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.