Description
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
Published: 2021-12-23
Score: 7.8 High
EPSS: 2.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4341-1 gegl security update
EUVD EUVD EUVD-2021-32229 load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
Ubuntu USN Ubuntu USN USN-5251-1 GEGL vulnerability
History

Mon, 03 Nov 2025 18:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T17:30:48.933Z

Reserved: 2021-12-23T00:00:00.000Z

Link: CVE-2021-45463

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-12-23T06:15:06.787

Modified: 2025-11-03T18:15:37.413

Link: CVE-2021-45463

cve-icon Redhat

Severity : Important

Publid Date: 2021-12-15T00:00:00Z

Links: CVE-2021-45463 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses