VYPR
Moderate severityNVD Advisory· Published Feb 24, 2026· Updated Feb 26, 2026

ImageMagick SIXEL Decoder Has Signed Integer Overflow, Leading to Memory Corruption

CVE-2026-25970

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A signed integer overflow in ImageMagick's SIXEL decoder can cause memory corruption and denial of service via a crafted image file.

Vulnerability

Overview

A signed integer overflow vulnerability exists in ImageMagick's SIXEL decoder, affecting versions prior to 7.1.2-15 and 6.9.13-40 [2]. The flaw occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows, leading to memory corruption [4]. This is a classic integer overflow issue in a C-based image processing library that handles a wide range of formats [1].

Exploitation

An attacker can exploit this vulnerability by crafting a malicious SIXEL image file and inducing the victim to process it with ImageMagick or an application that uses the library [2]. No authentication is required, and the attack can be delivered remotely via common vectors such as email attachments, web uploads, or automated processing pipelines [1]. The SIXEL decoder is invoked when the library processes the specially crafted file, triggering the overflow during memory reallocation [4].

Impact

Successful exploitation can result in memory corruption and denial of service, potentially crashing the application or causing unpredictable behavior [2]. While the description does not confirm remote code execution, memory corruption vulnerabilities in image decoders have historically been leveraged for code execution in other contexts. The primary impact is availability, but integrity and confidentiality could be affected if the corruption leads to further exploitation [4].

Mitigation

The vulnerability is patched in ImageMagick versions 7.1.2-15 and 6.9.13-40 [2]. Users should update to these versions or later. For those unable to update, a workaround is to disable the SIXEL decoder in the policy.xml configuration file, though this may affect functionality [1]. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x86NuGet
< 14.10.314.10.3

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-15, <6.9.13-40+ 1 more
    • (no CPE)range: <7.1.2-15, <6.9.13-40
    • (no CPE)range: >= 7.0.0, < 7.1.2-15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.