GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27823.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4362-1 gimp security update
Debian DSA Debian DSA DSA-6049-1 gimp security update
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 08 Jan 2026 02:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 22:15:00 +0900

Type Values Removed Values Added
First Time appeared Debian
Debian debian Linux
CPEs cpe:2.3:a:gimp:gimp:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
Vendors & Products Debian
Debian debian Linux

Tue, 04 Nov 2025 10:30:00 +0900

Type Values Removed Values Added
References

Thu, 30 Oct 2025 23:45:00 +0900

Type Values Removed Values Added
First Time appeared Gimp
Gimp gimp
Vendors & Products Gimp
Gimp gimp

Thu, 30 Oct 2025 21:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

threat_severity

Important


Thu, 30 Oct 2025 05:15:00 +0900

Type Values Removed Values Added
Description GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27823.
Title GIMP XWD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability
Weaknesses CWE-122
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2026-01-07T17:09:49.672Z

Reserved: 2025-09-24T20:52:16.567Z

Link: CVE-2025-10934

cve-icon Vulnrichment

Updated: 2025-11-04T00:12:05.168Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-29T20:15:35.423

Modified: 2025-11-04T13:12:43.120

Link: CVE-2025-10934

cve-icon Redhat

Severity : Important

Publid Date: 2025-10-29T19:58:55Z

Links: CVE-2025-10934 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-10-30T23:37:41Z

Weaknesses