Impact
An integer overflow occurs in GIMP’s parser when handling XPM files, leading to an attacker being able to execute arbitrary code within the GIMP process. The flaw arises from unvalidated user data being used to calculate a buffer size before allocation. The identified weakness is an integer overflow (CWE‑190).
Affected Systems
The vulnerability is documented for GIMP version 3.0.8, as indicated by the Common Platform Enumeration string. No other versions are explicitly mentioned in the advisory, so only this release is confirmed to be affected.
Risk and Exploitability
The CVSS score of 7.8 denotes a high severity vulnerability, while the EPSS score of less than 1% suggests exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires user interaction; an attacker must prompt a user to open a malicious XPM file or visit a page that triggers the vulnerable parser. Successful exploitation would give the attacker full control of the GIMP process.
OpenCVE Enrichment