{"id":"CVE-2025-14425","details":"GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.","modified":"2026-04-16T04:36:30.692523586Z","published":"2025-12-23T22:15:49.673Z","related":["ALSA-2026:0914","SUSE-SU-2026:0313-1","openSUSE-RU-2026:20168-1","openSUSE-SU-2026:10066-1","openSUSE-SU-2026:20100-1"],"references":[{"type":"ADVISORY","url":"https://www.zerodayinitiative.com/advisories/ZDI-25-1139/"},{"type":"FIX","url":"https://gitlab.gnome.org/GNOME/gimp/-/commit/cd1c88a0364ad1444c06536731972a99bd8643fd"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gnome/gimp","events":[{"introduced":"0"},{"last_affected":"a77e8fd05d3d08a58650531a3700100f6a3216b7"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0.6"}]}},{"type":"GIT","repo":"https://gitlab.gnome.org/GNOME/gimp","events":[{"introduced":"0"},{"fixed":"cd1c88a0364ad1444c06536731972a99bd8643fd"}]}],"versions":["BASE_ZERO","BEFORE_GIMAGE_IS_FLAT_REMOVAL","BEFORE_MATTS_CRAZY_TOOL_PATCH","BEFORE_TILE_MADNESS","FOR_PANEL","GIMP_0_99_16","GIMP_0_99_17","GIMP_0_99_18","GIMP_0_99_19","GIMP_0_99_20","GIMP_0_99_21","GIMP_0_99_22","GIMP_0_99_23","GIMP_0_99_24","GIMP_0_99_25","GIMP_0_99_27","GIMP_0_99_28","GIMP_0_99_29","GIMP_19990910","GIMP_1_0_0","GIMP_1_1_0","GIMP_1_1_1","GIMP_1_1_10","GIMP_1_1_11","GIMP_1_1_12","GIMP_1_1_13","GIMP_1_1_14","GIMP_1_1_15","GIMP_1_1_16","GIMP_1_1_17","GIMP_1_1_18","GIMP_1_1_19","GIMP_1_1_2","GIMP_1_1_20","GIMP_1_1_21","GIMP_1_1_22","GIMP_1_1_23","GIMP_1_1_24","GIMP_1_1_25","GIMP_1_1_26","GIMP_1_1_27","GIMP_1_1_28","GIMP_1_1_29","GIMP_1_1_3","GIMP_1_1_30","GIMP_1_1_31","GIMP_1_1_32","GIMP_1_1_4","GIMP_1_1_5","GIMP_1_1_6","GIMP_1_1_7","GIMP_1_1_8","GIMP_1_1_9","GIMP_1_2_0","GIMP_1_3_0","GIMP_1_3_1","GIMP_1_3_10","GIMP_1_3_11","GIMP_1_3_12","GIMP_1_3_13","GIMP_1_3_14","GIMP_1_3_15","GIMP_1_3_16","GIMP_1_3_17","GIMP_1_3_18","GIMP_1_3_19","GIMP_1_3_2","GIMP_1_3_20","GIMP_1_3_21","GIMP_1_3_22","GIMP_1_3_23","GIMP_1_3_24","GIMP_1_3_25","GIMP_1_3_26","GIMP_1_3_27","GIMP_1_3_3","GIMP_1_3_4","GIMP_1_3_5","GIMP_1_3_6","GIMP_1_3_7","GIMP_1_3_8","GIMP_1_3_9","GIMP_2_0_0","GIMP_2_0_1","GIMP_2_0_RC1","GIMP_2_10_0","GIMP_2_10_0_RC1","GIMP_2_10_0_RC2","GIMP_2_10_2","GIMP_2_1_0","GIMP_2_1_1","GIMP_2_1_2","GIMP_2_1_3","GIMP_2_1_4","GIMP_2_1_5","GIMP_2_1_6","GIMP_2_1_7","GIMP_2_2_0","GIMP_2_2_1","GIMP_2_2_PRE1","GIMP_2_2_PRE2","GIMP_2_3_0","GIMP_2_3_1","GIMP_2_3_10","GIMP_2_3_11","GIMP_2_3_12","GIMP_2_3_13","GIMP_2_3_14","GIMP_2_3_16","GIMP_2_3_17","GIMP_2_3_18","GIMP_2_3_19","GIMP_2_3_2","GIMP_2_3_3","GIMP_2_3_4","GIMP_2_3_5","GIMP_2_3_6","GIMP_2_3_7","GIMP_2_3_8","GIMP_2_3_9","GIMP_2_4_0_RC1","GIMP_2_4_0_RC2","GIMP_2_4_0_RC3","GIMP_2_4_1","GIMP_2_5_0","GIMP_2_5_1","GIMP_2_5_2","GIMP_2_5_3","GIMP_2_5_4","GIMP_2_6_0","GIMP_2_6_1","GIMP_2_7_1","GIMP_2_7_2","GIMP_2_7_3","GIMP_2_7_4","GIMP_2_7_5","GIMP_2_8_0","GIMP_2_8_0_RC1","GIMP_2_99_10","GIMP_2_99_12","GIMP_2_99_14","GIMP_2_99_16","GIMP_2_99_18","GIMP_2_99_2","GIMP_2_99_4","GIMP_2_99_6","GIMP_2_99_8","GIMP_2_9_2","GIMP_2_9_6","GIMP_2_9_8","GIMP_3_0_0","GIMP_3_0_0_RC1","GIMP_3_0_0_RC2","GIMP_3_0_0_RC3","GIMP_3_0_2","GIMP_3_0_4","GIMP_3_0_6","GIMP_3_1_2","GIMP_3_1_4","GIMP_BEFORE_GTK_2_0","GNOME_2_4_BRANCHPOINT","GNOME_BASE","GNOME_PRINT_0_24","LIBRSVG_2_1_1","LIBRSVG_2_1_2","LIBRSVG_2_1_3","LIBRSVG_2_1_4","LIBRSVG_2_1_5","LIBRSVG_2_2_0","NEEDS_GIMP_2_3_10","PROJECT_SUNLIGHT_ANCHOR","ROSALIA_BEFORE_COMMITTING_DL_AND_GNOME_HELLO","SCRIPT_FU_BEFORE_TINYSCHEME","SCRIPT_FU_MERGE","SNAP_19971121","TINY_FU_0_9_3","TINY_FU_0_9_4","TINY_FU_0_9_5","TINY_FU_0_9_6","TINY_FU_0_9_7","TINY_FU_0_9_8","TINY_FU_1_0_0","TINY_FU_1_0_1","TINY_FU_1_0_RC1","TINY_FU_1_1_0","gimp","release-2-2-4","release-2-2-5","release-2-3-0","release-2-4-0","soc-2012-unified-transform-after-gsoc","soc-2012-unified-transform-before-gsoc"],"database_specific":{"vanir_signatures":[{"signature_type":"Line","source":"https://gitlab.gnome.org/GNOME/gimp@cd1c88a0364ad1444c06536731972a99bd8643fd","signature_version":"v1","id":"CVE-2025-14425-767160a2","deprecated":false,"digest":{"threshold":0.9,"line_hashes":["143208036430314296961986827631728374851","222221557277362794152760193622460159335","284218251274804963486115042955704539316","11563942586014438493985573463148994574","82200996612786986732342680912453136580","332608754145080908735333324348539352403","310914729877903534557105084738945975707","197217607233473208929465463211317159422","181128376144385853555113882335669783671","272470308967247167468536885345945792836","275702904722748171611385972453133728912","106894716555825629506791674207752127429","328206966481336987953258757526774618692","169608778919813653768901030807351589267","169241633342071480416992084952890985517","339010519226612621674930417630827359151","42530859040627629450744881982354805973","298059321062591631897267178175202233335","1996019222832042004552305669358681256","137510563259698487553910818909047076185","54260110049098977635705189234394514467","250900019031387325857939251413405178226","290788415513889276873286242765033766882"]},"target":{"file":"plug-ins/common/file-jp2.c"}},{"signature_type":"Function","source":"https://gitlab.gnome.org/GNOME/gimp@cd1c88a0364ad1444c06536731972a99bd8643fd","signature_version":"v1","id":"CVE-2025-14425-90e30745","deprecated":false,"target":{"file":"plug-ins/common/file-jp2.c","function":"load_image"},"digest":{"function_hash":"302433188971668992060215610518145755468","length":5951}}],"vanir_signatures_modified":"2026-04-12T17:59:01Z","source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-14425.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}