ImageMagick's Security Policy Bypass through config/policy-secure.xml via "fd handler" leads to stdin/stdout access
Moderate severity
GitHub Reviewed
Published
Feb 23, 2026
in
ImageMagick/ImageMagick
•
Updated Feb 24, 2026
Description
Published by the National Vulnerability Database
Feb 24, 2026
Published to the GitHub Advisory Database
Feb 24, 2026
Reviewed
Feb 24, 2026
Last updated
Feb 24, 2026
The shipped “secure” security policy includes a rule intended to prevent reading/writing from standard streams:
However, ImageMagick also supports fd: pseudo-filenames (e.g., fd:0, fd:1). This path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of “no stdin/stdout”.
To resolve this, users can add the following change to their security policy.
And this will also be included in ImageMagick's more secure policies by default.
References