ImageMagick's MSL: Stack overflow in ProcessMSLScript
Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for circular references between two MSLs, leading to a stack overflow. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
ImageMagick fails to check for circular references between two MSL files, leading to a stack overflow before versions 7.1.2-15 and 6.9.13-40.
Vulnerability
Description
ImageMagick, a widely used open-source software suite for image manipulation, contains a vulnerability in the way it processes Magick Scripting Language (MSL) files. Prior to versions 7.1.2-15 and 6.9.13-40, the software fails to check for circular references between two MSLs. This oversight causes a recursive loop that leads to a stack overflow, potentially resulting in a crash or denial of service [2][4].
Exploitation
The vulnerability is triggered when ImageMagick processes a crafted MSL file that references another MSL, which in turn references the first, creating a circular dependency. The attack vector is through the processing of specially crafted image files that include malicious MSL instructions. No authentication is required; an attacker can deliver the crafted file through any mechanism supported by ImageMagick, such as direct file input or via a web service that uses ImageMagick for image processing [4]. The stack overflow occurs as the recursive calls between MSLStartElement, ReadImage, ReadMSLImage, ProcessMSLScript, and xmlParseChunk exhaust the call stack [4].
Impact
Successful exploitation leads to a stack overflow, primarily resulting in a denial of service (DoS) condition. The application crash may prevent legitimate image processing operations. While the advisory does not mention remote code execution, the nature of a stack overflow could potentially be leveraged for further exploitation under specific circumstances, though this is not confirmed [2][4].
Mitigation
The vulnerability has been patched in ImageMagick versions 7.1.2-15 and 6.9.13-40. Users are strongly advised to update to these patched versions or later. As a general security measure, it is also recommended to implement a security policy suitable for the local environment to restrict potentially dangerous operations [1][2][4].
- GitHub - ImageMagick/ImageMagick: ImageMagick is a free, open-source software suite for creating, editing, converting, and displaying images. It supports 200+ formats and offers powerful command-line tools and APIs for automation, scripting, and integration across platforms.
- NVD - CVE-2026-25971
- MSL: Stack overflow in ProcessMSLScript
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Magick.NET-Q16-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-OpenMP-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-x86NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q16-HDRI-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-AnyCPUNuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-OpenMP-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-arm64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x64NuGet | < 14.10.3 | 14.10.3 |
Magick.NET-Q8-x86NuGet | < 14.10.3 | 14.10.3 |
Affected products
2<7.1.2-15, <6.9.13-40+ 1 more
- (no CPE)range: <7.1.2-15, <6.9.13-40
- (no CPE)range: >= 7.0.0, < 7.1.2-15
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8mpr-6xr2-chhcghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25971ghsaADVISORY
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-8mpr-6xr2-chhcghsax_refsource_CONFIRMWEB
- github.com/dlemstra/Magick.NET/releases/tag/14.10.3ghsaWEB
News mentions
0No linked articles in our index yet.