Home / CVE DB / CVE-2026-25965
Standard
Vulnerability Identifier

CVE-2026-25965

2026-02-24
Severity Assessment
8.6
HIGH
CVSS v3.x Score
Clinical Analysis (Description)

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick’s path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.xml is applied. Actions to prevent reading from files have been taken in versions .7.1.2-15 and 6.9.13-40 But it make sure writing is also not possible the following should be added to one's policy. This will also be included in ImageMagick's more secure policies by default.

Vector Sequencing

Attack Parameters

Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Impact Consequences

Technical Impact

Changed
Scope
High
Confidentiality
None
Integrity
None
Availability
AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Weakness Classification

CWE-CWE-22

Timeline

Time Line

PUBLICATION
24 Feb 2026
MODIFICATION
25 Feb 2026
FIRST PATCH
21 Apr 2026
Impact Statistics

Key Metrics

CVSS Score
8.6
HIGH
Patches
2
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.