Arbitrary Code Injection Affecting imagemagick-dev package, versions <7.1.2.0-r0


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-IMAGEMAGICKDEV-15359088
  • published27 Feb 2026
  • disclosed24 Feb 2026

Introduced: 24 Feb 2026

NewCVE-2026-25797  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade Minimos:latest imagemagick-dev to version 7.1.2.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream imagemagick-dev package and not the imagemagick-dev package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicous file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. Versions 7.1.2-15 and 6.9.13-40 contain a patch.

CVSS Base Scores

version 3.1