Integer Overflow Vulnerability in GIMP's XWD File Parsing
CVE-2025-2760

7.8HIGH

Key Information:

Vendor

Gimp

Status
Vendor
CVE Published:
23 April 2025

Badges

📈 Score: 146👾 Exploit Exists📰 News Worthy

What is CVE-2025-2760?

CVE-2025-2760 is an integer overflow vulnerability within the XWD file parsing functionality of the GIMP image manipulation software. GIMP, a widely used open-source application for graphic design and photo editing, faces potential exploitation of this flaw, which stems from inadequate validation of user-provided input during the handling of XWD files. The vulnerability enables remote attackers to execute arbitrary code on affected systems if a user interacts with a maliciously crafted file or visits an infected webpage. This could severely disrupt organizational operations, leading to unauthorized system access and manipulation of critical data.

Potential impact of CVE-2025-2760

  1. Remote Code Execution: The vulnerability allows attackers to run arbitrary code within the context of the GIMP application process. This could lead to a compromise of the entire system, enabling malicious activities such as data exfiltration or installation of malware.

  2. User Interaction Requirement: Although exploitation necessitates user engagement (such as opening a malicious XWD file), the requirement for human action does not diminish the risk, as targeted phishing or social engineering attacks can effectively trick users into executing the exploit.

  3. Operational Disruption: Successful exploitation of the vulnerability can result in substantial operational impacts, including loss of productivity, damage to systems, and the potential need for extensive recovery efforts in cases where the integrity of data and systems is compromised.

Affected Version(s)

GIMP 2.10.38

News Articles

GIMP Image Editor Vulnerability Allows Remote Attackers to Execute Arbitrary Code

The flaw resides in the way GIMP parses X Window Dump (XWD) files—a format used for storing screenshots from X11 environments.

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

CVSS V3.0

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by GBHackers News

  • Vulnerability published

  • Vulnerability Reserved

.