CVE-2025-55298: ImageMagick has a Format String Bug in InterpretImageFilename leads to arbitrary code execution
A format string bug vulnerability exists in InterpretImageFilename
function where user input is directly passed to FormatLocaleString
without proper sanitization. An attacker can overwrite arbitrary memory regions, enabling a wide range of attacks from heap overflow to remote code execution.
References
- github.com/ImageMagick/ImageMagick
- github.com/ImageMagick/ImageMagick/commit/439b362b93c074eea6c3f834d84982b43ef057d5
- github.com/ImageMagick/ImageMagick/security/advisories/GHSA-9ccg-6pjw-x645
- github.com/advisories/GHSA-9ccg-6pjw-x645
- github.com/dlemstra/Magick.NET/releases/tag/14.8.1
- nvd.nist.gov/vuln/detail/CVE-2025-55298
Code Behaviors & Features
Detect and mitigate CVE-2025-55298 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →