ImageMagick 7.1.2-15 FTXT Stack Buffer Overflow CVE-2026-25967
CVE-2026-25967 Published on February 24, 2026
ImageMagick has stack buffer overflow in FTXT reader via oversized integer field
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. Version 7.1.2-15 contains a patch.
Vulnerability Analysis
CVE-2026-25967 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity and availability.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2026-25967 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2026-25967
Want to know whenever a new CVE is published for ImageMagick? stack.watch will email you.
Affected Versions
ImageMagick Version < 7.1.2-15 is affected by CVE-2026-25967Vulnerable Packages
The following package name and versions may be associated with CVE-2026-25967
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| nuget | Magick.NET-Q8-x86 | < 14.10.3 | 14.10.3 |
| nuget | agick.NET-Q8-x64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q8-arm64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q8-OpenMP-arm64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q8-AnyCPU | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-x86 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-x64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-arm64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-OpenMP-x86 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-OpenMP-x64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-OpenMP-arm64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-HDRI-x86 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-HDRI-x64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-HDRI-arm64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-HDRI-OpenMP-x64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-HDRI-OpenMP-arm64 | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-HDRI-AnyCPU | < 14.10.3 | 14.10.3 |
| nuget | Magick.NET-Q16-AnyCPU | < 14.10.3 | 14.10.3 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.