Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
7.8
GIMP may let attackers run malicious code if you open a bad XPM file
CVE-2026-4154
Summary
If someone tricks you into opening a malicious XPM file or visiting a fake website with a malicious XPM file, an attacker might be able to run malicious code on your computer. This affects GIMP installations and could lead to unauthorized access. Update GIMP to the latest version to prevent this.
Original title
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction ...
Original description
GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XPM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28901.
The specific flaw exists within the parsing of XPM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28901.
nvd CVSS3.0
7.8
Vulnerability type
CWE-190
Integer Overflow
Published: 11 Apr 2026 · Updated: 11 Apr 2026 · First seen: 11 Apr 2026