<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-33908 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-33908/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 13 Apr 2026 22:18:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-33908/feed.xml" rel="self" type="application/rss+xml"/><item><title>ImageMagick XML Bomb Denial-of-Service Vulnerability (CVE-2026-33908)</title><link>https://feed.craftedsignal.io/briefs/2026-04-imagemagick-dos/</link><pubDate>Mon, 13 Apr 2026 22:18:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-imagemagick-dos/</guid><description>ImageMagick versions prior to 7.1.2-19 and 6.9.13-44 are susceptible to a denial-of-service (DoS) attack due to unbounded recursion during XML parsing, potentially leading to stack exhaustion.</description><content:encoded><![CDATA[<p>ImageMagick is a widely used open-source software suite for displaying, converting, and editing raster image and vector image files. A critical vulnerability, identified as CVE-2026-33908, affects versions before 7.1.2-19 and 6.9.13-44. This vulnerability stems from the lack of depth limit during recursive processing of XML files via the <code>DestroyXMLTree()</code> function. An attacker can exploit this by crafting a malicious XML file with deeply nested structures. When ImageMagick parses this file, the recursive function exhausts stack memory, leading to a denial-of-service condition. Successful exploitation can disrupt services relying on ImageMagick, impacting image processing workflows. The vulnerability was addressed in versions 6.9.13-44 and 7.1.2-19.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious XML file with deeply nested elements.</li>
<li>The attacker delivers the crafted XML file to a system running a vulnerable version of ImageMagick (e.g., via upload, network share, or email attachment).</li>
<li>A user or automated process triggers ImageMagick to process the malicious XML file using command-line tools such as <code>convert</code> or through a web application using an ImageMagick library.</li>
<li>ImageMagick begins parsing the XML file and calls the <code>DestroyXMLTree()</code> function to free memory.</li>
<li>The <code>DestroyXMLTree()</code> function recursively traverses the XML tree without a depth limit.</li>
<li>Due to the deeply nested structure, the recursive calls consume excessive stack memory.</li>
<li>Stack memory is exhausted, leading to a stack overflow.</li>
<li>The ImageMagick process crashes, resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-33908 leads to a denial-of-service condition on the affected system. Services relying on ImageMagick for image processing become unavailable, potentially disrupting critical workflows. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high potential impact on system availability. The number of affected systems depends on the prevalence of vulnerable ImageMagick versions within an organization&rsquo;s infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ImageMagick to version 7.1.2-19 or 6.9.13-44 or later to remediate CVE-2026-33908.</li>
<li>Implement file size limits and input validation for XML files processed by ImageMagick to mitigate the risk of malicious file uploads.</li>
<li>Deploy the Sigma rule <code>ImageMagick_XML_Crash</code> to detect potential exploitation attempts by monitoring for ImageMagick process crashes.</li>
<li>Monitor web server logs for unusual patterns of requests with large XML file uploads to identify potential attackers.</li>
<li>Enable process crash reporting on systems running ImageMagick to facilitate incident response and investigation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dos</category><category>imagemagick</category><category>xml</category><category>cve-2026-33908</category></item></channel></rss>