First published: Mon Apr 07 2025(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FLI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
GIMP | ||
GIMP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-25-204 vulnerability has a CVSS rating of 7.8, indicating a high severity level.
To fix ZDI-25-204, ensure you update GIMP to the latest version released by the developers that addresses this vulnerability.
ZDI-25-204 affects installations of GIMP that are vulnerable to remote code execution when interacting with malicious files or websites.
Attackers can execute arbitrary code on affected installations of GIMP by tricking users into opening a malicious file or visiting a malicious webpage.
Yes, user interaction is required as the target must visit a malicious page or open a malicious file for the vulnerability to be exploited.