CVE-2025-65018

Advisory lineage Upstream: 0 Downstream: 36
Analyzed
Published: 24 Nov 2025, 23:50
Last modified:25 Nov 2025, 19:29

Vulnerability Summary

Overall Risk (default)
medium
38/100
CVSS Score
7.1 HIGH
v3.1 (cve.org)
EPSS Score
0.07% LOW
0% probability +0.03%
KEV
Not listed
Ransomware
No reports
Public exploits
1 found
Dark Web
Not detected

Timeline

24 Nov 2025, 23:50
Published
Vulnerability first disclosed
25 Nov 2025, 19:29
Last Modified
Vulnerability information updated

Description

LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.

CVSS Metrics

  • v3.1HIGHScore: 7.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

EPSS Trends

Current EPSS score: 0.07% Percentile: 21%

Techniques & Countermeasures

  • CWE-122Heap-based Buffer Overflow

    A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().

  • CWE-787Out-of-bounds Write

    The product writes data past the end, or before the beginning, of the intended buffer.

Affected Systems

  • libpnglibpng

    ≥ 1.6.0, < 1.6.51

  • pnggrouplibpng

    ≥ 1.6.0, < 1.6.51

References (5)