{
  "threat_severity" : "Important",
  "public_date" : "2026-04-11T00:16:01Z",
  "bugzilla" : {
    "description" : "gimp: GIMP: Remote Code Execution via PSP file parsing",
    "id" : "2457536",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2457536"
  },
  "cvss3" : {
    "cvss3_base_score" : "7.8",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
    "status" : "draft"
  },
  "cwe" : "CWE-120",
  "details" : [ "GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\nThe specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28874.", "A flaw was found in GIMP. A remote attacker could exploit this vulnerability by enticing a user to open a specially crafted PSP (PaintShop Pro) file. This flaw is caused by a heap-based buffer overflow, where the application does not properly validate the length of user-supplied data. Successful exploitation can lead to arbitrary code execution in the context of the current process." ],
  "statement" : "This is an Important vulnerability in GIMP that could lead to arbitrary code execution. The flaw requires user interaction, as an attacker must entice a user to open a specially crafted PSP (PaintShop Pro) file. Red Hat products are affected if GIMP is installed and used to open untrusted PSP files.",
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Affected",
    "package_name" : "gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Affected",
    "package_name" : "gimp:2.8/gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "fix_state" : "Affected",
    "package_name" : "gimp",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2026-4153\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-4153\nhttps://gitlab.gnome.org/GNOME/gimp/-/commit/98cb1371fd4e22cca75017ea3252dc32fc218712\nhttps://www.zerodayinitiative.com/advisories/ZDI-26-220/" ],
  "name" : "CVE-2026-4153",
  "mitigation" : {
    "value" : "To mitigate this vulnerability, users should avoid opening untrusted PSP (PaintShop Pro) files with GIMP. Restricting the sources of PSP files to only trusted origins can reduce the risk of exploitation.",
    "lang" : "en:us"
  },
  "csaw" : false
}