VYPR
Moderate severityNVD Advisory· Published Feb 24, 2026· Updated Feb 24, 2026

ImageMagick has possible infinite loop in JPEG encoder when using `jpeg:extent`

CVE-2026-26283

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a continue statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A crafted image can cause an infinite loop in ImageMagick's JPEG encoder, leading to a denial of service via 100% CPU consumption.

CVE-2026-26283 describes an infinite loop vulnerability in ImageMagick's JPEG extent binary search loop. The vulnerability resides in the jpeg encoder: when the continue statement is executed due to a persistent write failure, the loop never terminates, causing 100% CPU utilization and a process hang. This issue affects all versions prior to 7.1.2-15 and 6.9.13-40 [1][2].

An attacker can exploit this vulnerability by providing a specially crafted image file that triggers the write failure condition during JPEG encoding with the jpeg:extent option. The attack requires no authentication and can be delivered through any vector that causes ImageMagick to process the malicious image, such as a web application that uses ImageMagick for image conversion or resizing [3][4].

The impact is a denial of service (DoS) condition: the affected ImageMagick process hangs indefinitely, consuming 100% CPU and becoming unresponsive. This can lead to resource exhaustion on the host system, potentially affecting other services or users. No data integrity or confidentiality breach has been associated with this vulnerability [2][4].

ImageMagick has released patched versions 7.1.2-15 and 6.9.13-40 that fix the infinite loop by correcting the loop logic. Users are strongly advised to upgrade to these or later versions. If immediate upgrade is not possible, administrators can mitigate the risk by avoiding the use of the jpeg:extent option on untrusted images or by applying strict image-processing policies [1][2][4].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.314.10.3
Magick.NET-Q16-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x64NuGet
< 14.10.314.10.3
Magick.NET-Q16-x86NuGet
< 14.10.314.10.3
Magick.NET-Q8-AnyCPUNuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-arm64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x64NuGet
< 14.10.314.10.3
Magick.NET-Q8-x86NuGet
< 14.10.314.10.3

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-15 and <6.9.13-40+ 1 more
    • (no CPE)range: <7.1.2-15 and <6.9.13-40
    • (no CPE)range: >= 7.0.0, < 7.1.2-15

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.