{
  "threat_severity" : "Important",
  "public_date" : "2026-04-11T00:15:54Z",
  "bugzilla" : {
    "description" : "gimp: GIMP: Remote Code Execution via malicious JP2 file parsing",
    "id" : "2457533",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2457533"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-131",
  "details" : [ "GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28863.", "A flaw was found in GIMP. A remote attacker could exploit this by tricking a user into opening a specially crafted JP2 (JPEG 2000) file. This flaw is due to a heap-based buffer overflow during JP2 file parsing, which allows for arbitrary code execution. Successful exploitation enables the attacker to execute code in the context of the current process." ],
  "statement" : "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. The flaw is a heap-based buffer overflow in the JP2 file parsing component. Exploitation requires user interaction, where a victim must open a specially crafted malicious JP2 file.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "gimp:2.8/gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-4152\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4152\nhttps://gitlab.gnome.org/GNOME/gimp/-/commit/f64c9c23ba3c37dc7b875a9fb477c23953b4666e\nhttps://www.zerodayinitiative.com/advisories/ZDI-26-219/" ],
  "name" : "CVE-2026-4152",
  "mitigation" : {
    "value" : "To mitigate this issue, users should avoid opening JP2 (JPEG 2000) files from untrusted sources in GIMP. If GIMP is not required, consider removing the `gimp` package to eliminate the attack surface. For systems where GIMP is necessary, running the application within a sandboxed environment can limit the potential impact of successful exploitation. Removing this package may affect other applications that depend on GIMP.",
    "lang" : "en:us"
  },
  "csaw" : false
}