PT-2025-29508 · Unknown +1 · Imagemagick +1
Iwashiira
+3
·
Published
2025-07-14
·
Updated
2025-07-16
·
CVE-2025-53101
7.4
High
Base vector | Vector | AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
ImageMagick versions prior to 7.1.2-0
ImageMagick versions prior to 6.9.13-26
**Description:**
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions prior to 7.1.2-0 and 6.9.13-26, specifying multiple consecutive `%d` format specifiers in a filename template within the `magick mogrify` command causes internal pointer arithmetic to generate an address below the beginning of the stack buffer, resulting in a stack overflow through the `vsnprintf()` function.
**Recommendations:**
ImageMagick versions prior to 7.1.2-0: Upgrade to version 7.1.2-0 or later.
ImageMagick versions prior to 6.9.13-26: Upgrade to version 6.9.13-26 or later.
Exploit
Fix
RCE
Weakness Enumeration
Related Identifiers
Affected Products
References · 15
- 🔥 https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qh3h-j545-h8c9⭐ 13967 🔗 1466 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53101 · Security Note
- https://security-tracker.debian.org/tracker/source-package/imagemagick · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-53101 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-53101 · Security Note
- https://security-tracker.debian.org/tracker/CVE-2025-53101 · Vendor Advisory
- https://github.com/ImageMagick/ImageMagick/commit/66dc8f51c11b0ae1f1cdeacd381c3e9a4de69774⭐ 13967 🔗 1466 · Note
- https://twitter.com/VulmonFeeds/status/1944892902326358191 · Twitter Post
- https://twitter.com/CVEnew/status/1944854067819274598 · Twitter Post
- https://t.me/c/2230009192/27815 · Telegram Post
- https://twitter.com/autumn_good_35/status/1945479189374894401 · Twitter Post
- https://packages.debian.org/src:imagemagick · Note
- https://twitter.com/the_yellow_fall/status/1944920224933011542 · Twitter Post
- https://twitter.com/fridaysecurity/status/1944921355507654711 · Twitter Post
- https://t.me/c/1233397458/64471 · Telegram Post