CVSS Score: 5.7 Published: 2026-03-10 Full Report: https://cvereports.com/reports/CVE-2026-30883
ImageMagick versions prior to 7.1.2-16 and 6.9.13-41 suffer from a heap-based buffer overflow in the PNG encoder (coders/png.c). This vulnerability is triggered when processing specially crafted PNG images containing extremely large metadata profiles, leading to memory corruption, denial of service, and potential limited integrity impact.
A heap buffer overflow in ImageMagick's PNG encoder (CVE-2026-30883) allows attackers to trigger a denial of service via malformed images with oversized profiles. Update to versions 7.1.2-16 or 6.9.13-41.
- CWE ID: CWE-119
- Attack Vector: Local
- CVSS Score: 5.7
- EPSS Score: 0.00013
- Impact: Denial of Service (DoS)
- Exploit Status: None
- ImageMagick 7.x
- ImageMagick 6.x
- Magick.NET
- ImageMagick: >= 7.0.0, < 7.1.2-16 (Fixed in:
7.1.2-16) - ImageMagick: < 6.9.13-41 (Fixed in:
6.9.13-41) - Magick.NET: < 14.10.4 (Fixed in:
14.10.4)
- Upgrade ImageMagick to patched versions
- Update Magick.NET dependencies
- Implement resource limits via policy.xml if unable to patch
Remediation Steps:
- Identify all systems and containers running ImageMagick.
- Verify current versions using 'magick -version' or 'identify -version'.
- Update ImageMagick 7.x to 7.1.2-16 or 6.x to 6.9.13-41.
- Update Magick.NET to 14.10.4.
- Restart services dependent on ImageMagick libraries.
Generated by CVEReports - Automated Vulnerability Intelligence