Cyber Posture

CVE-2026-28494

High

Published: 10 March 2026

Published
10 March 2026
Modified
12 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
EPSS Score 0.0001 3.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28494 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Imagemagick Imagemagick. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 3.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.003 Malicious Image Execution
Adversaries may rely on a user running a malicious image to facilitate execution.
Why these techniques?

Stack buffer overflow in ImageMagick image parser enables code execution when user processes malicious image file (local access, user interaction required).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size…

more

stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.

Deeper analysisAI

CVE-2026-28494 is a stack buffer overflow vulnerability in ImageMagick, a free and open-source software suite for editing and manipulating digital images. The issue affects versions prior to 7.1.2-16 and 6.9.13-41, specifically in the morphology kernel parsing functions. User-controlled kernel strings that exceed the buffer size are copied into fixed-size stack buffers using memcpy without bounds checking, leading to stack corruption. This flaw is classified under CWE-121 (Stack-based Buffer Overflow) with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H).

An attacker with local access to the system can exploit this vulnerability by providing a malicious image file containing oversized kernel strings in the morphology parameters. Exploitation requires user interaction, such as convincing a user to process the crafted image with ImageMagick via a command-line tool or script. Successful exploitation results in high-impact integrity and availability violations, including potential stack corruption that could enable code execution, denial of service, or modification of image processing results, though confidentiality is not affected.

The official ImageMagick security advisory on GitHub (GHSA-932h-jw47-73jm) confirms the vulnerability and states that it is fixed in versions 7.1.2-16 and 6.9.13-41. Security practitioners should update to these patched versions immediately and avoid processing untrusted images with vulnerable installations.

Details

CWE(s)

Affected Products

imagemagick
imagemagick
≤ 6.9.13-41 · 7.0.0-0 — 7.1.2-16

CVEs Like This One

CVE-2026-30929Same product: Imagemagick Imagemagick
CVE-2026-25967Same product: Imagemagick Imagemagick
CVE-2026-25968Same product: Imagemagick Imagemagick
CVE-2026-25795Same product: Imagemagick Imagemagick
CVE-2026-33905Same product: Imagemagick Imagemagick
CVE-2026-26284Same product: Imagemagick Imagemagick
CVE-2026-25983Same product: Imagemagick Imagemagick
CVE-2026-26283Same product: Imagemagick Imagemagick
CVE-2026-25988Same product: Imagemagick Imagemagick
CVE-2026-25796Same product: Imagemagick Imagemagick

References