Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
Published: 2026-02-24
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Memory Leak Causing Resource Exhaustion
Action: Patch Immediately
AI Analysis

Impact

A flaw in ImageMagick’s msl.c component prevents the stack index from being refreshed on error, causing an image to be stored in the wrong slot and never freed. This results in a memory leak (CWE‑401) and an uninitialized data exposure (CWE‑911). The continual leaking of memory can eventually exhaust system resources, potentially leading to denial of service for applications that rely on the library.

Affected Systems

The vulnerability affects all installations of ImageMagick prior to release 7.1.2‑15 and 6.9.13‑40. It exists in the msl.c module that manages image stack indices, regardless of the host platform.

Risk and Exploitability

With a CVSS base score of 5.3 the flaw is considered moderate. The EPSS score of less than 1% indicates a very low likelihood of exploitation at the time of analysis, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is through image processing operations—such as conversion, resizing, or other manipulations—performed on user‑supplied images, which may be triggered remotely if the application accepts untrusted content.

Generated by OpenCVE AI on April 17, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ImageMagick to 7.1.2‑15 or later, or 6.9.13‑40 or later to apply the patch.
  • If upgrading is not immediately possible, restrict the processing of external images to a sandboxed environment to contain potential memory exhaustion.
  • As a last resort, disable functionalities that rely on msl.c (e.g., image stack manipulation operations) until a patched version is available.

Generated by OpenCVE AI on April 17, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4497-1 imagemagick security update
Debian DSA Debian DSA DSA-6158-1 imagemagick security update
Debian DSA Debian DSA DSA-6159-1 imagemagick security update
Github GHSA Github GHSA GHSA-782x-jh29-9mf7 ImageMagick: MSL image stack index may fail to refresh, leading to leaked images
History

Sat, 28 Feb 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*

Tue, 24 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Imagemagick
Imagemagick imagemagick
Vendors & Products Imagemagick
Imagemagick imagemagick

Tue, 24 Feb 2026 02:00:00 +0000

Type Values Removed Values Added
Description ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
Title ImageMagick's MSL image stack index not refreshed, leading to leaked images.
Weaknesses CWE-401
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}


Subscriptions

Imagemagick Imagemagick
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-28T02:08:29.771Z

Reserved: 2026-02-09T17:41:55.858Z

Link: CVE-2026-25988

cve-icon Vulnrichment

Updated: 2026-02-28T02:08:25.313Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T02:16:03.097

Modified: 2026-02-25T11:56:36.800

Link: CVE-2026-25988

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-02-24T01:48:29Z

Links: CVE-2026-25988 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses