VYPR
Medium severity5.3GHSA Advisory· Published May 18, 2026· Updated May 18, 2026

ImageMagick: Policy Bypass in PSD decoder

CVE-2026-45031

Description

Due to a missing check in the PSD decoder it would be possible to bypass the list-length resource policy when decoding a PSD image. Other security limits would still apply.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing check in ImageMagick's PSD decoder allows bypass of the `list-length` resource policy, risking denial of service via crafted images.

Vulnerability

A missing check in the PSD decoder of ImageMagick (all versions prior to the fix in the associated advisory) allows an attacker to bypass the list-length resource policy when decoding a crafted PSD image. Other security limits remain in effect. The affected versions include ImageMagick itself and the Magick.NET NuGet packages (e.g., Magick.NET-Q16-AnyCPU) before version 14.13.1 [1][2].

Exploitation

The attacker must supply a specially crafted PSD image to an application or service that uses ImageMagick to decode images. No authentication or special privileges are required, and no user interaction beyond triggering the decode (e.g., viewing the image) is needed. The attack can be performed remotely over a network [3]. The exploitation sequence involves sending the malicious PSD file to the target, which then decodes it and bypasses the list-length limit.

Impact

Successful exploitation allows the attacker to bypass the resource policy intended to limit resource consumption (e.g., memory used by image layers). This could lead to excessive resource consumption, resulting in a denial-of-service (DoS) condition as the application may exhaust available memory or processing time. The CVSS vector notes impacts on availability as the primary concern [3].

Mitigation

The fix is included in ImageMagick version 14.13.1 (and corresponding Magick.NET packages) as noted in the GitHub advisory [2]. Users should upgrade to these patched versions. No workaround is available; however, other security limits (e.g., memory, map, disk) still apply and may partially mitigate the impact. This CVE is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.