CVE-2026-2045
Out-of-Bounds Write in GIMP XWD Parsing Enables RCE
Publication date: 2026-02-20
Last updated on: 2026-02-24
Assigner: Zero Day Initiative
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| gimp | gimp | 3.0.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the GIMP software, specifically in the way it parses XWD files. It is an out-of-bounds write flaw caused by improper validation of user-supplied data, which allows writing past the end of an allocated buffer.
An attacker can exploit this vulnerability by tricking a user into opening a malicious XWD file or visiting a malicious page, which requires user interaction.
Successful exploitation allows the attacker to execute arbitrary code within the context of the current process running GIMP.
How can this vulnerability impact me? :
This vulnerability can lead to remote code execution on your system if you open a malicious XWD file or visit a malicious page while using GIMP.
An attacker could gain control over the affected system with the same privileges as the user running GIMP, potentially leading to data theft, system compromise, or further attacks.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, avoid opening or interacting with untrusted XWD files in GIMP, as exploitation requires user interaction such as opening a malicious file.
Additionally, ensure that your GIMP installation is updated to the latest version where this vulnerability is patched.