Advisory Database
  • Advisories
  • Dependency Scanning
  1. nuget
  2. ›
  3. Magick.NET-Q16-x86
  4. ›
  5. CVE-2026-25797

CVE-2026-25797: ImageMagick: Code Injection via PostScript header in ps coders

February 24, 2026

The ps encoders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicious file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed.

The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code.

References

  • github.com/ImageMagick/ImageMagick
  • github.com/ImageMagick/ImageMagick/commit/26088a83d71e9daa203d54a56fe3c31f3f85463d
  • github.com/ImageMagick/ImageMagick/security/advisories/GHSA-rw6c-xp26-225v
  • github.com/advisories/GHSA-rw6c-xp26-225v
  • github.com/dlemstra/Magick.NET/releases/tag/14.10.3
  • nvd.nist.gov/vuln/detail/CVE-2026-25797

Code Behaviors & Features

Detect and mitigate CVE-2026-25797 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 14.10.3

Fixed versions

  • 14.10.3

Solution

Upgrade to version 14.10.3 or above.

Impact 5.7 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-94: Improper Control of Generation of Code ('Code Injection')

Source file

nuget/Magick.NET-Q16-x86/CVE-2026-25797.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:40 +0000.