Description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incremented past the end of a buffer that is on the stack and that could result in an out of bounds write. Versions 7.1.2-18 and 6.9.13-43 patch the issue.
Published: 2026-03-26
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Out‑of‑Bounds Write on Stack Buffer
Action: Immediate Patch
AI Analysis

Impact

ImageMagick code that interprets image filenames on certain platforms fails to handle a return value correctly, causing a pointer to advance past the end of a stack buffer. This produces an out‑of‑bounds write that can corrupt adjacent memory. The result may be a program crash or, if control data is overwritten, could lead to arbitrary code execution. The weakness maps to stack buffer overflow (CWE‑121, CWE‑787, CWE‑823).

Affected Systems

Versions of ImageMagick released before 7.1.2‑18 and before 6.9.13‑43 are affected. Any installation that was built from source during that period or still ships with those legacy artifacts is at risk. The vulnerability is not tied to a specific operating system but is platform‑dependent in its manifestation.

Risk and Exploitability

The CVSS score of 5.1 reflects moderate severity. The EPSS score of less than 1% suggests that real‑world exploitation is unlikely at present, and the flaw is not listed in the CISA Known Exploited Vulnerabilities catalog. Attackers would need to supply a specially crafted image file that triggers the faulty return path, typically through an application that accepts untrusted media. Until the vendor’s patch is applied, the potential for denial of service or arbitrary code execution remains. No confirmed public exploits are reported.

Generated by OpenCVE AI on April 2, 2026 at 23:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ImageMagick to at least 7.1.2‑18 or 6.9.13‑43 to apply the vendor patch.

Generated by OpenCVE AI on April 2, 2026 at 23:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4539-1 imagemagick security update
Debian DSA Debian DSA DSA-6210-1 imagemagick security update
Github GHSA Github GHSA GHSA-8793-7xv6-82cf ImageMagick has an Out-of-bounds Write via InterpretImageFilename
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*

Fri, 27 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-823
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 27 Mar 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Imagemagick
Imagemagick imagemagick
Vendors & Products Imagemagick
Imagemagick imagemagick

Thu, 26 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-18 and 6.9.13-43, due to an incorrect return value on certain platforms a pointer is incremented past the end of a buffer that is on the stack and that could result in an out of bounds write. Versions 7.1.2-18 and 6.9.13-43 patch the issue.
Title ImageMagick has an Out-of-bounds Write via InterpretImageFilename
Weaknesses CWE-121
CWE-787
References
Metrics cvssV3_1

{'score': 5.1, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Imagemagick Imagemagick
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T13:57:36.689Z

Reserved: 2026-03-20T18:05:11.831Z

Link: CVE-2026-33536

cve-icon Vulnrichment

Updated: 2026-03-27T13:44:38.144Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-26T20:16:15.877

Modified: 2026-04-02T17:47:47.153

Link: CVE-2026-33536

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-03-26T19:57:53Z

Links: CVE-2026-33536 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:49Z

Weaknesses