{"id":"CVE-2026-25797","summary":"ImageMagick vulnerable to Code injection via PostScript header in ps coders","details":"ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header.  An attacker can provide a malicous file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. Versions 7.1.2-15 and 6.9.13-40 contain a patch.","aliases":["GHSA-rw6c-xp26-225v"],"modified":"2026-05-15T04:12:34.439555869Z","published":"2026-02-24T01:01:22.025Z","related":["SUSE-SU-2026:0851-1","SUSE-SU-2026:0852-1","SUSE-SU-2026:0853-1","SUSE-SU-2026:0854-1","openSUSE-SU-2026:10267-1","openSUSE-SU-2026:20337-1"],"database_specific":{"cwe_ids":["CWE-94"],"unresolved_ranges":[{"extracted_events":[{"fixed":"6.9.13-40"}],"source":"AFFECTED_FIELD"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25797.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25797.json"},{"type":"ADVISORY","url":"https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-rw6c-xp26-225v"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-25797"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L"}]}