VYPR
Moderate severityNVD Advisory· Published Mar 9, 2026· Updated Mar 10, 2026

ImageMagick has a Heap Overflow when writing extremely large image profile in the PNG encoder

CVE-2026-30883

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A heap buffer overflow in ImageMagick's PNG encoder when processing extremely large image profiles can lead to memory corruption and potential code execution.

Vulnerability

Overview ImageMagick, a widely used open-source image processing suite, contains a heap buffer overflow vulnerability in its PNG encoder. When an image with an extremely large profile is encoded to PNG, the software fails to properly handle the memory allocation, leading to a heap overflow [1][2][3][4]. This issue affects versions prior to 7.1.2-16 and 6.9.13-41.

Exploitation

An attacker can exploit this vulnerability by providing a crafted image file containing an oversized profile. The attack requires no special privileges beyond the ability to supply an image for processing, and user interaction is minimal (e.g., opening the file or triggering an automated conversion). The overflow occurs during the encoding phase, which can be triggered remotely if the application processes user-supplied images [4].

Impact

Successful exploitation could allow an attacker to corrupt memory, potentially leading to arbitrary code execution or denial of service. The heap overflow may overwrite adjacent data structures, enabling control flow hijacking. Given ImageMagick's use in web services, content management systems, and automated pipelines, this vulnerability poses a significant risk [3][4].

Mitigation

The vulnerability has been patched in ImageMagick versions 7.1.2-16 and 6.9.13-41. Users are strongly advised to update immediately. For those unable to upgrade, implementing strict security policies to limit image profile sizes may reduce risk, but patching is the recommended course of action [1][2].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.414.10.4
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.414.10.4
Magick.NET-Q16-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-x86NuGet
< 14.10.414.10.4
Magick.NET-Q8-AnyCPUNuGet
< 14.10.414.10.4
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.414.10.4
Magick.NET-Q8-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q8-x64NuGet
< 14.10.414.10.4
Magick.NET-Q8-x86NuGet
< 14.10.414.10.4

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <=7.1.2-15, <=6.9.13-40+ 1 more
    • (no CPE)range: <=7.1.2-15, <=6.9.13-40
    • (no CPE)range: >= 7.0.0, < 7.1.2-16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.