You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
ImageMagick has a Path Policy TOCTOU symlink race bypass
Moderate severity
GitHub Reviewed
Published
Mar 9, 2026
in
ImageMagick/ImageMagick
•
Updated Mar 10, 2026
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Learn more on MITRE.
domain="path"authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write.References