CVE-2026-33908
Received Received - Intake
Stack Exhaustion DoS in ImageMagick XML Parsing

Publication date: 2026-04-13

Last updated on: 2026-04-17

Assigner: GitHub, Inc.

Description
ImageMagick is free and open-source software used for editing and manipulating digital images. In versions below both 7.1.2-19 and 6.9.13-44, Magick frees the memory of the XML tree via the `DestroyXMLTree()` function; however, this process is executed recursively with no depth limit imposed. When Magick processes an XML file with deeply nested structures, it will exhaust the stack memory, resulting in a Denial of Service (DoS) attack. This issue has been fixed in versions 6.9.13-44 and 7.1.2-19.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-13
Last Modified
2026-04-17
Generated
2026-05-06
AI Q&A
2026-04-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
imagemagick imagemagick to 6.9.13-44 (exc)
imagemagick imagemagick From 7.0.0-0 (inc) to 7.1.2-19 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-674 The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as allocated memory or the program stack.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in ImageMagick versions below 7.1.2-19 and 6.9.13-44. The issue occurs because the function DestroyXMLTree() frees the memory of an XML tree recursively without any limit on the depth of recursion. When processing an XML file with deeply nested structures, this can cause the stack memory to be exhausted, leading to a Denial of Service (DoS) condition.


How can this vulnerability impact me? :

The vulnerability can cause a Denial of Service (DoS) attack by exhausting the stack memory when processing specially crafted XML files with deeply nested structures. This means that an attacker could cause the ImageMagick software to crash or become unresponsive, potentially disrupting services or applications that rely on it.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should upgrade ImageMagick to version 7.1.2-19 or later, or version 6.9.13-44 or later, where the issue has been fixed.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart