CVE-2026-25989
Published: 24 February 2026
Summary
CVE-2026-25989 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Imagemagick Imagemagick. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 5.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The off-by-one error in SVG processing enables remote attackers to supply a crafted file that triggers integer issues leading to application crash or resource exhaustion, directly matching exploitation of software vulnerabilities to cause endpoint denial of service.
NVD Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass…
more
the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
Deeper analysisAI
CVE-2026-25989 affects ImageMagick, a free and open-source software suite for editing and manipulating digital images. The vulnerability exists in versions prior to 7.1.2-15 and 6.9.13-40 due to an off-by-one boundary check that uses ">" instead of ">=" when processing SVG files. This flaw allows a crafted SVG file to bypass a guard clause and trigger an undefined cast to (size_t), resulting in a denial of service. It is associated with CWEs 190 (Integer Overflow or Wraparound), 681 (Incorrect Conversion between Numeric Types), and 193 (Off-by-One Error), and carries a CVSS v3.1 base score of 7.5.
The vulnerability can be exploited by remote attackers with network access, requiring low attack complexity, no privileges, and no user interaction. Exploitation involves providing a specially crafted SVG file to an affected ImageMagick instance, leading to a crash or resource exhaustion that disrupts service availability, with no impact on confidentiality or integrity.
The official ImageMagick GitHub security advisory (GHSA-7355-pwx2-pm84) confirms that versions 7.1.2-15 and 6.9.13-40 address the issue with a patch fixing the boundary check. Security practitioners should update to these or later versions to mitigate the risk.
Details
- CWE(s)