VYPR
Moderate severityNVD Advisory· Published Feb 24, 2026· Updated Feb 26, 2026

ImageMagick has infinite loop when writing IPTCTEXT leads to denial of service via crafted profile

CVE-2026-26066

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted profile contain invalid IPTC data may cause an infinite loop when writing it with IPTCTEXT. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A crafted image profile with invalid IPTC data causes an infinite loop in ImageMagick when writing with IPTCTEXT, leading to denial of service.

Vulnerability

Overview

ImageMagick, a widely used open-source image processing suite, contains a denial-of-service vulnerability in its handling of IPTC metadata. Prior to versions 7.1.2-15 and 6.9.13-40, a specially crafted image profile containing invalid IPTC data can trigger an infinite loop when the software attempts to write the profile using the IPTCTEXT coder [2][4]. The root cause is improper validation of IPTC data structures, causing the parser to never reach a termination condition.

Exploitation

An attacker can exploit this vulnerability by supplying a crafted image file (e.g., via upload or direct processing) that includes a malicious IPTC profile. No authentication or special privileges are required; the attack can be performed remotely if the victim processes the image with ImageMagick. The infinite loop consumes CPU resources, effectively hanging the process and leading to a denial-of-service condition [4].

Impact

Successful exploitation results in a denial of service, as the affected ImageMagick process becomes unresponsive. This can disrupt automated image processing pipelines, web services, or any application relying on ImageMagick for image manipulation. The vulnerability does not lead to code execution or data exfiltration; the primary impact is on availability [2][4].

Mitigation

The vulnerability has been patched in ImageMagick versions 7.1.2-15 and 6.9.13-40 [2][3]. Users are strongly advised to update to these or later versions. For those unable to upgrade, restricting the processing of untrusted image files or disabling the IPTCTEXT coder via policy configuration may serve as a temporary workaround [4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x86NuGet
< 14.10.314.10.3
Magick.NET-Q8-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x64NuGet
< 14.10.314.10.3
agick.NET-Q8-x86NuGet
< 14.10.314.10.3

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-15, <6.9.13-40+ 1 more
    • (no CPE)range: <7.1.2-15, <6.9.13-40
    • (no CPE)range: >= 7.0.0, < 7.1.2-15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.