Search for vulnerabilities
Vulnerability details: VCID-m4pp-xw4q-dkh4
Vulnerability ID VCID-m4pp-xw4q-dkh4
Aliases CVE-2025-32460
Summary GraphicsMagick before 8e56520 has a heap-based buffer over-read in ReadJXLImage in coders/jxl.c, related to an ImportViewPixelArea call.
Status Published
Exploitability 0.5
Weighted Severity 2.0
Risk 1.0
Affected and Fixed Packages Package Details
Weaknesses (1)
System Score Found at
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00011 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00015 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.0002 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00021 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00022 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
epss 0.00024 https://api.first.org/data/v1/epss?cve=CVE-2025-32460
cvssv3.1 4 https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb
ssvc Track https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb
cvssv3.1 4 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1 4 https://issues.oss-fuzz.com/issues/406320404
ssvc Track https://issues.oss-fuzz.com/issues/406320404
cvssv3.1 4 https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/
ssvc Track https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/
No exploits are available.
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:26:13Z/ Found at https://foss.heptapod.net/graphicsmagick/graphicsmagick/-/commit/8e56520435df50f618a03f2721a39a70a515f1cb
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://issues.oss-fuzz.com/issues/406320404
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:26:13Z/ Found at https://issues.oss-fuzz.com/issues/406320404
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Found at https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none


Vector: SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:26:13Z/ Found at https://tracker.debian.org/news/1636753/accepted-graphicsmagick-14really1345hg17696-1-source-into-unstable/
Exploit Prediction Scoring System (EPSS)
Percentile 0.00691
EPSS Score 0.00011
Published At April 9, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-04-09T06:02:39.550125+00:00 Debian Importer Import https://security-tracker.debian.org/tracker/data/json 36.0.0