Search for vulnerabilities
Vulnerability details: VCID-zsvx-52r4-cbf8
Vulnerability ID VCID-zsvx-52r4-cbf8
Aliases BIT-pillow-2022-45199
CVE-2022-45199
GHSA-q4mp-jvh2-76fj
PYSEC-2022-42980
Summary Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
epss 0.00099 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.00105 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
epss 0.0013 https://api.first.org/data/v1/epss?cve=CVE-2022-45199
cvssv3.1 7.5 https://bugs.gentoo.org/878769
generic_textual HIGH https://bugs.gentoo.org/878769
cvssv3.1 5.3 https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
cvssv3.1_qr HIGH https://github.com/advisories/GHSA-q4mp-jvh2-76fj
cvssv3.1 7.5 https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml
generic_textual HIGH https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml
cvssv3.1 7.5 https://github.com/python-pillow/Pillow
generic_textual HIGH https://github.com/python-pillow/Pillow
cvssv3.1 7.5 https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
generic_textual HIGH https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
cvssv3.1 7.5 https://github.com/python-pillow/Pillow/pull/6700
generic_textual HIGH https://github.com/python-pillow/Pillow/pull/6700
cvssv3.1 7.5 https://github.com/python-pillow/Pillow/releases/tag/9.3.0
generic_textual HIGH https://github.com/python-pillow/Pillow/releases/tag/9.3.0
cvssv3.1 7.5 https://nvd.nist.gov/vuln/detail/CVE-2022-45199
generic_textual HIGH https://nvd.nist.gov/vuln/detail/CVE-2022-45199
cvssv3.1 7.5 https://security.gentoo.org/glsa/202211-10
generic_textual HIGH https://security.gentoo.org/glsa/202211-10
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://bugs.gentoo.org/878769
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L Found at https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/python-pillow/Pillow
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/python-pillow/Pillow/pull/6700
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://github.com/python-pillow/Pillow/releases/tag/9.3.0
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2022-45199
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://security.gentoo.org/glsa/202211-10
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.28075
EPSS Score 0.00099
Published At Sept. 9, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:21:24.007967+00:00 Pypa Importer Import https://github.com/pypa/advisory-database/blob/main/vulns/pillow/PYSEC-2022-42980.yaml 37.0.0