Cyber Posture

CVE-2026-25989

High

Published: 24 February 2026

Published
24 February 2026
Modified
24 February 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0002 5.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25989 is a high-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Imagemagick Imagemagick. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 5.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The off-by-one error in SVG processing enables remote attackers to supply a crafted file that triggers integer issues leading to application crash or resource exhaustion, directly matching exploitation of software vulnerabilities to cause endpoint denial of service.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass…

more

the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

Deeper analysisAI

CVE-2026-25989 affects ImageMagick, a free and open-source software suite for editing and manipulating digital images. The vulnerability exists in versions prior to 7.1.2-15 and 6.9.13-40 due to an off-by-one boundary check that uses ">" instead of ">=" when processing SVG files. This flaw allows a crafted SVG file to bypass a guard clause and trigger an undefined cast to (size_t), resulting in a denial of service. It is associated with CWEs 190 (Integer Overflow or Wraparound), 681 (Incorrect Conversion between Numeric Types), and 193 (Off-by-One Error), and carries a CVSS v3.1 base score of 7.5.

The vulnerability can be exploited by remote attackers with network access, requiring low attack complexity, no privileges, and no user interaction. Exploitation involves providing a specially crafted SVG file to an affected ImageMagick instance, leading to a crash or resource exhaustion that disrupts service availability, with no impact on confidentiality or integrity.

The official ImageMagick GitHub security advisory (GHSA-7355-pwx2-pm84) confirms that versions 7.1.2-15 and 6.9.13-40 address the issue with a patch fixing the boundary check. Security practitioners should update to these or later versions to mitigate the risk.

Details

CWE(s)

Affected Products

imagemagick
imagemagick
≤ 6.9.13-40 · 7.0.0-0 — 7.1.2-15

CVEs Like This One

CVE-2026-25795Same product: Imagemagick Imagemagick
CVE-2026-30883Same product: Imagemagick Imagemagick
CVE-2026-26066Same product: Imagemagick Imagemagick
CVE-2026-25799Same product: Imagemagick Imagemagick
CVE-2026-22770Same product: Imagemagick Imagemagick
CVE-2026-30931Same product: Imagemagick Imagemagick
CVE-2026-26283Same product: Imagemagick Imagemagick
CVE-2026-25971Same product: Imagemagick Imagemagick
CVE-2026-25796Same product: Imagemagick Imagemagick
CVE-2026-33908Same product: Imagemagick Imagemagick

References