VYPR
High severityNVD Advisory· Published Mar 9, 2026· Updated Mar 10, 2026

ImageMagick has a stack buffer overflow in MagnifyImage

CVE-2026-30929

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

ImageMagick's MagnifyImage function uses a fixed-size stack buffer that can be overflowed via a crafted image, leading to stack corruption; fixed in versions 7.1.2-16 and 6.9.13-41.

Vulnerability

Overview The vulnerability resides in the MagnifyImage function of ImageMagick, a widely-used open-source image processing suite. The function allocates a fixed-size buffer on the stack without proper bounds checking, and when processing a specially crafted image, it overwrites adjacent stack memory. This stack buffer overflow can corrupt critical data, potentially leading to arbitrary code execution or system instability. The issue affects ImageMagick versions prior to 7.1.2-16 and 6.9.13-41 [1][2].

Exploitation

An attacker can exploit this vulnerability by supplying a malicious image file to ImageMagick via any interface that triggers the MagnifyImage function. The attack can be performed remotely, requires no authentication, and no user interaction beyond processing the image (e.g., via web uploads or automated scripts). The attack complexity is low, as the overflow can be triggered with a crafted image that exceeds the expected buffer size [4].

Impact

Successful exploitation allows an attacker to corrupt the stack, which can lead to arbitrary code execution in the context of the ImageMagick process. This could enable further compromise of the system, including data theft, denial of service, or full system takeover. The CVSS score (not yet assigned by NIST) likely reflects high impacts on confidentiality, integrity, and availability due to the severity of stack corruption [4].

Mitigation

The vulnerability is patched in ImageMagick versions 7.1.2-16 and 6.9.13-41. Users are strongly advised to update their installations immediately. The fix is included in downstream packages such as Magick.NET 14.10.4 [3]. As a workaround, administrators can implement a security policy to restrict the use of MagnifyImage or avoid processing untrusted images until upgrading.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
Magick.NET-Q16-AnyCPUNuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-AnyCPUNuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-OpenMP-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-x86NuGet
< 14.10.414.10.4
Magick.NET-Q16-OpenMP-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-OpenMP-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-OpenMP-x86NuGet
< 14.10.414.10.4
Magick.NET-Q16-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q16-x64NuGet
< 14.10.414.10.4
Magick.NET-Q16-x86NuGet
< 14.10.414.10.4
Magick.NET-Q16-HDRI-OpenMP-x64NuGet
< 14.10.414.10.4
Magick.NET-Q8-AnyCPUNuGet
< 14.10.414.10.4
Magick.NET-Q8-OpenMP-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q8-OpenMP-x64NuGet
< 14.10.414.10.4
Magick.NET-Q8-arm64NuGet
< 14.10.414.10.4
Magick.NET-Q8-x64NuGet
< 14.10.414.10.4
Magick.NET-Q8-x86NuGet
< 14.10.414.10.4

Affected products

2
  • ImageMagick/Imagemagickllm-fuzzy2 versions
    <7.1.2-16, <6.9.13-41+ 1 more
    • (no CPE)range: <7.1.2-16, <6.9.13-41
    • (no CPE)range: >= 7.0.0, < 7.1.2-16

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.