VYPR
Medium severity5.3GHSA Advisory· Published May 18, 2026· Updated May 18, 2026

ImageMagick: Policy Bypass in MNG coder could

CVE-2026-45664

Description

Because of a missing check in the MNG coder it would be possible to read more images than the list limit policy would allow resulting in excessive resource use.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A missing check in ImageMagick's MNG coder allows bypassing the list limit policy, leading to excessive resource consumption and denial of service.

Vulnerability

A missing check in the MNG coder of ImageMagick allows an attacker to read more images than the list limit policy would permit, resulting in excessive resource use. This affects ImageMagick and its .NET wrapper Magick.NET prior to the fix released in Magick.NET version 14.13.1 [2][3]. The vulnerability is present in the MNG decoding path and can be triggered by processing a specially crafted MNG file.

Exploitation

An attacker can exploit this vulnerability by providing a malicious MNG file to an application that uses ImageMagick to process images. No authentication or special privileges are required; the attack can be performed remotely if the application accepts user-supplied images. The missing check allows the decoder to iterate beyond the configured list limit, causing excessive memory and CPU consumption.

Impact

Successful exploitation leads to a denial of service (DoS) condition due to excessive resource consumption. The impact is primarily on availability; there is no indication of confidentiality or integrity compromise. The excessive resource use can cause the application or system to become unresponsive.

Mitigation

Update to Magick.NET version 14.13.1 or later, which contains the fix [2][3]. For standalone ImageMagick installations, apply the corresponding patch from the advisory. If an immediate update is not possible, consider restricting MNG file processing or implementing resource limits via the ImageMagick policy configuration (policy.xml).

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.