Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. Version 7.1.2-15 contains a patch.
Published: 2026-02-24
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

ImageMagick contains a stack-based buffer overflow in the FTXT image reader that allows out‑of‑bounds writes to the stack when processing a crafted file. The flaw is triggered by an oversized integer field in the file header and results in a program crash; while the description does not confirm arbitrary code execution, the nature of the overflow could permit it if an attacker can control the payload. This vulnerability corresponds to several common weaknesses: stack corruption (CWE‑121), unsigned integer overflow (CWE‑190), and buffer overread/write (CWE‑787).

Affected Systems

The flaw affects installations of ImageMagick, specifically all releases before 7.1.2‑15. Any system that uses the ImageMagick library to read FTXT files, such as web servers, document processors, or media applications, may be impacted when provided with a malicious file. Versions 7.1.2‑15 and later include the patch that resolves the overflow.

Risk and Exploitability

The CVSS score of 7.4 marks this vulnerability as moderately severe. Its EPSS probability is below 1%, suggesting that, as of now, the volume of exploitation in the wild is very low. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. An attacker would need to supply a crafted FTXT file to the ImageMagick library, which could be achieved through file uploads, email attachments, or other import mechanisms. Once processed, the crash could lead to denial of service, and if the attacker achieves control over the stack, arbitrary code execution is possible, though no public exploits have been documented.

Generated by OpenCVE AI on April 17, 2026 at 16:00 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade all ImageMagick instances to version 7.1.2‑15 or newer, which contains the fixed FTXT reader.
  • Configure the image processing subsystem to reject or ignore files with the .FTXT extension if the format is not required, thereby removing the vulnerable code path.
  • Apply additional file validation or sandboxing around image parsing routines to ensure that malformed FTXT files are not executed against privileged processes.

Generated by OpenCVE AI on April 17, 2026 at 16:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6158-1 imagemagick security update
Github GHSA Github GHSA GHSA-72hf-fj62-w6j4 ImageMagick: Stack buffer overflow in FTXT reader via oversized integer field
History

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*

Tue, 24 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-190
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Imagemagick
Imagemagick imagemagick
Vendors & Products Imagemagick
Imagemagick imagemagick

Tue, 24 Feb 2026 02:00:00 +0000

Type Values Removed Values Added
Description ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. Version 7.1.2-15 contains a patch.
Title ImageMagick has stack buffer overflow in FTXT reader via oversized integer field
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Imagemagick Imagemagick
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-26T21:33:39.865Z

Reserved: 2026-02-09T17:13:54.067Z

Link: CVE-2026-25967

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T02:16:01.483

Modified: 2026-02-25T11:58:43.147

Link: CVE-2026-25967

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-24T01:29:44Z

Links: CVE-2026-25967 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses