CVE-2026-33905
Received Received - Intake
Out-of-Bounds Read in ImageMagick -sample Operation

Publication date: 2026-04-13

Last updated on: 2026-04-17

Assigner: GitHub, Inc.

Description
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, the -sample operation has an out of bounds read when an specific offset is set through the `sample:offset` define that could lead to an out of bounds read. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-17
Generated
2026-05-07
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
imagemagick imagemagick to 6.9.13-44 (exc)
imagemagick imagemagick From 7.0.0-0 (inc) to 7.1.2-19 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-125 The product reads data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ImageMagick versions below 7.1.2-19 and 6.9.13-44. It involves the -sample operation, which when used with a specific offset set through the `sample:offset` define, can cause an out of bounds read. This means the software reads memory outside the intended buffer, which can lead to unexpected behavior or crashes.


How can this vulnerability impact me? :

The impact of this vulnerability is an out of bounds read, which can cause the application to crash or behave unpredictably. According to the CVSS score (5.5), the vulnerability requires local access with low privileges and user interaction. While it does not affect confidentiality or integrity, it can cause availability issues by crashing the application.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade ImageMagick to version 7.1.2-19 or later, or version 6.9.13-44 or later, as these versions contain the fix for the out of bounds read issue related to the -sample operation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart