ImageMagick SIXEL Decoder Has Signed Integer Overflow, Leading to Memory Corruption
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A signed integer overflow in ImageMagick's SIXEL decoder can cause memory corruption and denial of service via a crafted image file.
Vulnerability
Overview
A signed integer overflow vulnerability exists in ImageMagick's SIXEL decoder, affecting versions prior to 7.1.2-15 and 6.9.13-40 [2]. The flaw occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows, leading to memory corruption [4]. This is a classic integer overflow issue in a C-based image processing library that handles a wide range of formats [1].
Exploitation
An attacker can exploit this vulnerability by crafting a malicious SIXEL image file and inducing the victim to process it with ImageMagick or an application that uses the library [2]. No authentication is required, and the attack can be delivered remotely via common vectors such as email attachments, web uploads, or automated processing pipelines [1]. The SIXEL decoder is invoked when the library processes the specially crafted file, triggering the overflow during memory reallocation [4].
Impact
Successful exploitation can result in memory corruption and denial of service, potentially crashing the application or causing unpredictable behavior [2]. While the description does not confirm remote code execution, memory corruption vulnerabilities in image decoders have historically been leveraged for code execution in other contexts. The primary impact is availability, but integrity and confidentiality could be affected if the corruption leads to further exploitation [4].
Mitigation
The vulnerability is patched in ImageMagick versions 7.1.2-15 and 6.9.13-40 [2]. Users should update to these versions or later. For those unable to update, a workaround is to disable the SIXEL decoder in the policy.xml configuration file, though this may affect functionality [1]. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.
- GitHub - ImageMagick/ImageMagick: ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, scripting, and integration across platforms.
- NVD - CVE-2026-25970
- Signed Integer Overflow in ImageMagick SIXEL Decoder
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x86NuGet | < 14.10.3 | 14.10.3 |
Affected products
2<7.1.2-15, <6.9.13-40+ 1 more
- (no CPE)range: <7.1.2-15, <6.9.13-40
- (no CPE)range: >= 7.0.0, < 7.1.2-15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-xg29-8ghv-v4xrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25970ghsaADVISORY
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-xg29-8ghv-v4xrghsax_refsource_CONFIRMWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.10.3ghsaWEB
News mentions
0No linked articles in our index yet.