CVE-2026-25990
Published: 11 February 2026
Summary
CVE-2026-25990 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Python Pillow. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OOB write in remote image-processing library (PSD) directly enables remote exploitation of public-facing apps (T1190) to trigger application DoS via crafted input (T1499.004).
NVD Description
Pillow is a Python imaging library. From 10.3.0 to before 12.1.1, an out-of-bounds write may be triggered when loading a specially crafted PSD image. This vulnerability is fixed in 12.1.1.
Deeper analysisAI
CVE-2026-25990 is an out-of-bounds write vulnerability (CWE-787) in Pillow, a Python imaging library. It affects versions from 10.3.0 up to but not including 12.1.1 and can be triggered by loading a specially crafted PSD image. The issue carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting high availability impact with no confidentiality or integrity effects.
Any remote attacker can exploit this vulnerability without privileges or user interaction by supplying a malicious PSD image to a vulnerable application using Pillow for image processing. Exploitation leads to an out-of-bounds write, typically resulting in denial-of-service via application crash or memory corruption.
Pillow version 12.1.1 resolves the vulnerability through a specific commit at https://github.com/python-pillow/Pillow/commit/9000313cc5d4a31bdcdd6d7f0781101abab553aa. Further details appear in the project's GitHub security advisory at https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc and an oss-security mailing list post at http://www.openwall.com/lists/oss-security/2026/02/12/1. Mitigation requires updating to Pillow 12.1.1 or later.
Details
- CWE(s)