Miggo Logo

CVE-2025-55160: ImageMagick has Undefined Behavior (function-type-mismatch) in CloneSplayTree

6.1

CVSS Score
3.1

Basic Information

EPSS Score
0.0547%
Published
8/25/2025
Updated
8/25/2025
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
Magick.NET-Q16-AnyCPUnuget< 14.8.014.8.0
Magick.NET-Q16-HDRI-AnyCPUnuget< 14.8.014.8.0
Magick.NET-Q16-HDRI-OpenMP-arm64nuget< 14.8.014.8.0
Magick.NET-Q16-HDRI-OpenMP-x64nuget< 14.8.014.8.0
Magick.NET-Q16-HDRI-arm64nuget< 14.8.014.8.0
Magick.NET-Q16-HDRI-x64nuget< 14.8.014.8.0
Magick.NET-Q16-HDRI-x86nuget< 14.8.014.8.0
Magick.NET-Q16-OpenMP-arm64nuget< 14.8.014.8.0
Magick.NET-Q16-OpenMP-x64nuget< 14.8.014.8.0
Magick.NET-Q16-arm64nuget< 14.8.014.8.0
Magick.NET-Q16-x64nuget< 14.8.014.8.0
Magick.NET-Q16-x86nuget< 14.8.014.8.0
Magick.NET-Q8-AnyCPUnuget< 14.8.014.8.0
Magick.NET-Q8-OpenMP-arm64nuget< 14.8.014.8.0
Magick.NET-Q8-OpenMP-x64nuget< 14.8.014.8.0
Magick.NET-Q8-arm64nuget< 14.8.014.8.0
Magick.NET-Q8-x64nuget< 14.8.014.8.0
Magick.NET-Q8-x86nuget< 14.8.014.8.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability is an undefined behavior due to a function type mismatch in ImageMagick. The provided commit SHA in the advisory was found to be incorrect and unrelated to the vulnerability. The analysis is therefore based on the detailed information and stack trace from the vulnerability report itself. The vulnerability is triggered when processing an image, specifically during the coalescing operation, which is initiated by the MagickCoalesceImages function. The call stack clearly shows a sequence of function calls (MagickCoalesceImages -> CoalesceImages -> CloneImage -> CloneImageProfiles) that culminates in a call to CloneSplayTree inside CloneImageProfiles. The CloneImageProfiles function incorrectly passes ConstantString as a callback to CloneSplayTree. The function signature of ConstantString does not match the expected signature for the callback in CloneSplayTree, leading to a crash in builds with sanitizers enabled (UBSan) and undefined behavior in production builds. The identified functions are all part of this vulnerable call chain and would appear in a runtime profile when the vulnerability is triggered.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

## Summ*ry - **T*r**t:** Im***M**i*k (*ommit `****************************************`) - **Typ*:** Un***in** ****vior (*un*tion-typ*-mism*t**) in spl*y tr** *lonin* **ll***k - **Imp**t:** **t*rministi* **ort un**r U*S*n (*oS in s*nitiz*r *uil*s). N

Reasoning

T** vuln*r**ility is *n un***in** ****vior *u* to * *un*tion typ* mism*t** in Im***M**i*k. T** provi*** *ommit S** in t** **visory w*s *oun* to ** in*orr**t *n* unr*l*t** to t** vuln*r**ility. T** *n*lysis is t**r**or* **s** on t** **t*il** in*orm*ti