CVE-2026-4151 is a Remote Code Execution (RCE) vulnerability affecting GIMP versions 3.0.8. This flaw stems from improper validation during the parsing of ANI files, leading to an integer overflow. Successful exploitation allows an attacker to execute arbitrary code on the system, requiring user interaction such as opening a malicious file or visiting a malicious webpage. A patch is available to resolve this issue.
The impact of CVE-2026-4151 is significant due to its RCE nature. An attacker could leverage this vulnerability to gain complete control over a vulnerable GIMP installation. This could involve installing malware, stealing sensitive data, or using the compromised system as a launchpad for further attacks on the network. The requirement for user interaction (opening a malicious ANI file) lowers the immediate risk, but widespread use of GIMP and the ease of distributing malicious files make it a concerning vulnerability. Similar integer overflow vulnerabilities in image processing libraries have historically been exploited to compromise systems.
CVE-2026-4151 was publicly disclosed on 2026-04-11. Its exploitation context is currently unknown, and no public proof-of-concept (PoC) exploits have been released. The vulnerability is not listed on the CISA KEV catalog at the time of writing. The CVSS score of 7.8 (HIGH) indicates a significant potential for exploitation if a PoC is developed and widely distributed.
Exploit Status
EPSS
0.07% (21% percentile)
CISA SSVC
The primary mitigation for CVE-2026-4151 is to upgrade GIMP to a patched version as soon as possible. If immediate patching is not feasible, consider restricting user access to untrusted ANI files. Network segmentation can limit the potential blast radius if a system is compromised. While a WAF is unlikely to directly address this file parsing vulnerability, it can help prevent the delivery of malicious ANI files to users. After upgrading, confirm the fix by attempting to open a known-malicious ANI file (in a safe, isolated environment) and verifying that GIMP does not crash or exhibit unexpected behavior.
Update GIMP to a patched version to mitigate the integer overflow vulnerability in ANI file parsing. Refer to the release notes or the official GIMP website for specific upgrade instructions.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-4151 is a Remote Code Execution vulnerability in GIMP 3.0.8, allowing attackers to execute code via malicious ANI files. It has a CVSS score of 7.8 (HIGH).
If you are using GIMP version 3.0.8, you are potentially affected. Upgrade to a patched version to mitigate the risk.
The recommended fix is to upgrade GIMP to a patched version. Check the official GIMP website for available updates.
As of the current date, there are no confirmed reports of active exploitation, but the vulnerability's severity warrants caution.
Refer to the official GIMP website and security advisories for the latest information and updates regarding CVE-2026-4151.
CVSS Vector
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.