Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
5.3

ImageMagick fails to sanitize PostScript input, allowing code injection

DEBIAN-CVE-2026-25797
Summary

ImageMagick's PostScript feature doesn't properly check for malicious code, which can be executed by a printer or viewer when processing a file. This can lead to unauthorized actions on the system. Update to version 7.1.2-15 or 6.9.13-40 to fix the issue.

What to do
  • Update debian imagemagick to version 8:7.1.1.43+dfsg1-1+deb13u6.
  • Update debian imagemagick to version 8:7.1.2.15+dfsg1-1.
Affected software
VendorProductAffected versionsFix available
debian imagemagick All versions
debian imagemagick All versions
debian imagemagick <= 8:7.1.1.43+dfsg1-1+deb13u6 8:7.1.1.43+dfsg1-1+deb13u6
debian imagemagick <= 8:7.1.2.15+dfsg1-1 8:7.1.2.15+dfsg1-1
Original title
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fai...
Original description
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header. An attacker can provide a malicous file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
osv CVSS3.1 5.3
Published: 24 Feb 2026 · Updated: 13 Mar 2026 · First seen: 10 Mar 2026