CVE-2025-52456
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-25

Last updated on: 2025-11-03

Assigner: Talos

Description
A memory corruption vulnerability exists in the WebP Image Decoding functionality of the SAIL Image Decoding Library v0.9.8. When loading a specially crafted .webp animation an integer overflow can be made to occur when calculating the stride for decoding. Afterwards, this will cause a heap-based buffer to overflow when decoding the image which can lead to remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-25
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-08-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
sail sail 0.9.8
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-680 The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that causes less memory to be allocated than expected, leading to a buffer overflow.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a memory corruption issue in the WebP Image Decoding functionality of the SAIL Image Decoding Library version 0.9.8. Specifically, when decoding a specially crafted .webp animation file, an integer overflow can occur during the calculation of the stride, which leads to a heap-based buffer overflow. This buffer overflow can potentially allow an attacker to execute remote code on the affected system. To exploit this, an attacker must convince the library to read a maliciously crafted file.


How can this vulnerability impact me? :

This vulnerability can have severe impacts including remote code execution, which means an attacker could run arbitrary code on your system without your permission. This could lead to full system compromise, data theft, or disruption of services. Because the vulnerability can be triggered remotely by convincing the library to read a malicious file, it poses a significant security risk.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart