ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7355-pwx2-pm84 | ImageMagick: Integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 24 Feb 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:* |
Tue, 24 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-193 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 24 Feb 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Imagemagick
Imagemagick imagemagick |
|
| Vendors & Products |
Imagemagick
Imagemagick imagemagick |
Tue, 24 Feb 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`>` instead of `>=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch. | |
| Title | ImageMagick has integer overflow or wraparound and incorrect conversion between numeric types in the internal SVG decoder | |
| Weaknesses | CWE-190 CWE-681 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-24T01:50:12.995Z
Reserved: 2026-02-09T17:41:55.858Z
Link: CVE-2026-25989
No data.
Status : Analyzed
Published: 2026-02-24T03:16:00.773
Modified: 2026-02-24T18:43:16.560
Link: CVE-2026-25989
OpenCVE Enrichment
Updated: 2026-02-24T09:53:37Z
Github GHSA