We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32025

bep/imagemeta allows a potentially large memory allocation in PNG and WebP parsing



Description

bep/imagemeta is a Go library for reading EXIF, IPTC and XMP image meta data from JPEG, TIFF, PNG, and WebP files. The buffer created for parsing metadata for PNG and WebP images was only bounded by their input data type, which could lead to potentially large memory allocation, and unreasonably high for image metadata. Before v0.11.0, If you didn't trust the input images, this could be abused to construct denial-of-service attacks. v0.11.0 added a 10 MB upper limit.

Reserved 2025-04-01 | Published 2025-04-08 | Updated 2025-04-08 | Assigner GitHub_M


MEDIUM: 6.9CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-770: Allocation of Resources Without Limits or Throttling

Product status

< v0.11.0
affected

References

github.com/...gemeta/security/advisories/GHSA-fmhh-rw3h-785m

github.com/...ommit/ee0de9b029f4e82106729f69559f27c9a404229d

cve.org (CVE-2025-32025)

nvd.nist.gov (CVE-2025-32025)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32025

Support options

Helpdesk Chat, Email, Knowledgebase