{"id":"CVE-2025-14422","details":"GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.","modified":"2026-04-11T01:19:59.868626Z","published":"2025-12-23T22:15:49.290Z","related":["ALSA-2026:0914","ALSA-2026:1574","MGASA-2026-0012","SUSE-SU-2026:0313-1","openSUSE-RU-2026:20168-1","openSUSE-SU-2026:10066-1","openSUSE-SU-2026:20100-1"],"references":[{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-25-1136/"},{"type":"FIX","url":"https://gitlab.gnome.org/GNOME/gimp/-/commit/4ff2d773d58064e6130495de498e440f4a6d5edb"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/gimp","events":[{"introduced":"0"},{"last_affected":"a77e8fd05d3d08a58650531a3700100f6a3216b7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.6"}]}},{"type":"GIT","repo":"https://gitlab.gnome.org/GNOME/gimp","events":[{"introduced":"0"},{"fixed":"4ff2d773d58064e6130495de498e440f4a6d5edb"}]}],"versions":["BASE_ZERO","BEFORE_GIMAGE_IS_FLAT_REMOVAL","BEFORE_MATTS_CRAZY_TOOL_PATCH","BEFORE_TILE_MADNESS","FOR_PANEL","GIMP_0_99_16","GIMP_0_99_17","GIMP_0_99_18","GIMP_0_99_19","GIMP_0_99_20","GIMP_0_99_21","GIMP_0_99_22","GIMP_0_99_23","GIMP_0_99_24","GIMP_0_99_25","GIMP_0_99_27","GIMP_0_99_28","GIMP_0_99_29","GIMP_19990910","GIMP_1_0_0","GIMP_1_1_0","GIMP_1_1_1","GIMP_1_1_10","GIMP_1_1_11","GIMP_1_1_12","GIMP_1_1_13","GIMP_1_1_14","GIMP_1_1_15","GIMP_1_1_16","GIMP_1_1_17","GIMP_1_1_18","GIMP_1_1_19","GIMP_1_1_2","GIMP_1_1_20","GIMP_1_1_21","GIMP_1_1_22","GIMP_1_1_23","GIMP_1_1_24","GIMP_1_1_25","GIMP_1_1_26","GIMP_1_1_27","GIMP_1_1_28","GIMP_1_1_29","GIMP_1_1_3","GIMP_1_1_30","GIMP_1_1_31","GIMP_1_1_32","GIMP_1_1_4","GIMP_1_1_5","GIMP_1_1_6","GIMP_1_1_7","GIMP_1_1_8","GIMP_1_1_9","GIMP_1_2_0","GIMP_1_3_0","GIMP_1_3_1","GIMP_1_3_10","GIMP_1_3_11","GIMP_1_3_12","GIMP_1_3_13","GIMP_1_3_14","GIMP_1_3_15","GIMP_1_3_16","GIMP_1_3_17","GIMP_1_3_18","GIMP_1_3_19","GIMP_1_3_2","GIMP_1_3_20","GIMP_1_3_21","GIMP_1_3_22","GIMP_1_3_23","GIMP_1_3_24","GIMP_1_3_25","GIMP_1_3_26","GIMP_1_3_27","GIMP_1_3_3","GIMP_1_3_4","GIMP_1_3_5","GIMP_1_3_6","GIMP_1_3_7","GIMP_1_3_8","GIMP_1_3_9","GIMP_2_0_0","GIMP_2_0_1","GIMP_2_0_RC1","GIMP_2_10_0","GIMP_2_10_0_RC1","GIMP_2_10_0_RC2","GIMP_2_10_2","GIMP_2_1_0","GIMP_2_1_1","GIMP_2_1_2","GIMP_2_1_3","GIMP_2_1_4","GIMP_2_1_5","GIMP_2_1_6","GIMP_2_1_7","GIMP_2_2_0","GIMP_2_2_1","GIMP_2_2_PRE1","GIMP_2_2_PRE2","GIMP_2_3_0","GIMP_2_3_1","GIMP_2_3_10","GIMP_2_3_11","GIMP_2_3_12","GIMP_2_3_13","GIMP_2_3_14","GIMP_2_3_16","GIMP_2_3_17","GIMP_2_3_18","GIMP_2_3_19","GIMP_2_3_2","GIMP_2_3_3","GIMP_2_3_4","GIMP_2_3_5","GIMP_2_3_6","GIMP_2_3_7","GIMP_2_3_8","GIMP_2_3_9","GIMP_2_4_0_RC1","GIMP_2_4_0_RC2","GIMP_2_4_0_RC3","GIMP_2_4_1","GIMP_2_5_0","GIMP_2_5_1","GIMP_2_5_2","GIMP_2_5_3","GIMP_2_5_4","GIMP_2_6_0","GIMP_2_6_1","GIMP_2_7_1","GIMP_2_7_2","GIMP_2_7_3","GIMP_2_7_4","GIMP_2_7_5","GIMP_2_8_0","GIMP_2_8_0_RC1","GIMP_2_99_10","GIMP_2_99_12","GIMP_2_99_14","GIMP_2_99_16","GIMP_2_99_18","GIMP_2_99_2","GIMP_2_99_4","GIMP_2_99_6","GIMP_2_99_8","GIMP_2_9_2","GIMP_2_9_6","GIMP_2_9_8","GIMP_3_0_0","GIMP_3_0_0_RC1","GIMP_3_0_0_RC2","GIMP_3_0_0_RC3","GIMP_3_0_2","GIMP_3_0_4","GIMP_3_0_6","GIMP_3_1_2","GIMP_3_1_4","GIMP_3_2_0_RC1","GIMP_BEFORE_GTK_2_0","GNOME_2_4_BRANCHPOINT","GNOME_BASE","GNOME_PRINT_0_24","LIBRSVG_2_1_1","LIBRSVG_2_1_2","LIBRSVG_2_1_3","LIBRSVG_2_1_4","LIBRSVG_2_1_5","LIBRSVG_2_2_0","NEEDS_GIMP_2_3_10","PROJECT_SUNLIGHT_ANCHOR","ROSALIA_BEFORE_COMMITTING_DL_AND_GNOME_HELLO","SCRIPT_FU_BEFORE_TINYSCHEME","SCRIPT_FU_MERGE","SNAP_19971121","TINY_FU_0_9_3","TINY_FU_0_9_4","TINY_FU_0_9_5","TINY_FU_0_9_6","TINY_FU_0_9_7","TINY_FU_0_9_8","TINY_FU_1_0_0","TINY_FU_1_0_1","TINY_FU_1_0_RC1","TINY_FU_1_1_0","gimp","release-2-2-4","release-2-2-5","release-2-3-0","release-2-4-0","soc-2012-unified-transform-after-gsoc","soc-2012-unified-transform-before-gsoc"],"database_specific":{"vanir_signatures":[{"source":"https://gitlab.gnome.org/GNOME/gimp@4ff2d773d58064e6130495de498e440f4a6d5edb","target":{"file":"plug-ins/common/file-pnm.c","function":"load_image"},"signature_type":"Function","signature_version":"v1","digest":{"function_hash":"228469555598829722891331656510557054390","length":4001},"id":"CVE-2025-14422-0b445001","deprecated":false},{"source":"https://gitlab.gnome.org/GNOME/gimp@4ff2d773d58064e6130495de498e440f4a6d5edb","target":{"file":"plug-ins/common/file-pnm.c","function":"pnm_load_raw"},"signature_type":"Function","signature_version":"v1","digest":{"function_hash":"245546342038372617518455184894375816689","length":1830},"id":"CVE-2025-14422-380acb20","deprecated":false},{"source":"https://gitlab.gnome.org/GNOME/gimp@4ff2d773d58064e6130495de498e440f4a6d5edb","target":{"file":"plug-ins/common/file-pnm.c"},"signature_type":"Line","signature_version":"v1","digest":{"line_hashes":["20178699464875198386726819502244920479","35186838701790663353849430255505239061","11133522750507032918145089820917335132","86190469056230208376888107852599302007","64035021531504172613383683067323619736","6755724430232002978999247553079034264","144757633600342756885667457229004494684","183720694179690274192881032112935462035","52735455486333382727804085548811101110","287333734597615033107187176354562548255","28851029794786168178004134884482318596","82052081377886713846628419013310781327","225923404650543112844378610375146591785","228083178790408425117426526751700949972","73639127518021918285200993743990173472"],"threshold":0.9},"id":"CVE-2025-14422-847d227a","deprecated":false}],"vanir_signatures_modified":"2026-04-11T01:19:59Z","source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-14422.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}