Improper Access Control Affecting imagemagick-dev package, versions <7.1.2.0-r0


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.01% (3rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-MINIMOSLATEST-IMAGEMAGICKDEV-15359444
  • published27 Feb 2026
  • disclosed24 Feb 2026

Introduced: 24 Feb 2026

NewCVE-2026-25966  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Minimos:latest imagemagick-dev to version 7.1.2.0-r0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream imagemagick-dev package and not the imagemagick-dev package as distributed by Minimos. See How to fix? for Minimos:latest relevant fixed versions and status.

ImageMagick is free and open-source software used for editing and manipulating digital images. The shipped "secure" security policy includes a rule intended to prevent reading/writing from standard streams. However, ImageMagick also supports fd:<n> pseudo-filenames (e.g., fd:0, fd:1). Prior to versions 7.1.2-15 and 6.9.13-40, this path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of "no stdin/stdout." Versions 7.1.2-15 and 6.9.13-40 contain a patch by including a change to the more secure policies by default. As a workaround, add the change to one's security policy manually.

CVSS Base Scores

version 3.1