CVE-2025-52456

A memory corruption vulnerability exists in the WebP Image Decoding functionality of the SAIL Image Decoding Library v0.9.8. When loading a specially crafted .webp animation an integer overflow can be made to occur when calculating the stride for decoding. Afterwards, this will cause a heap-based buffer to overflow when decoding the image which can lead to remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.
References
Link Resource
https://talosintelligence.com/vulnerability_reports/TALOS-2025-2224 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sail:sail:0.9.8:*:*:*:*:*:*:*

History

02 Sep 2025, 17:13

Type Values Removed Values Added
First Time Sail
Sail sail
References () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2224 - () https://talosintelligence.com/vulnerability_reports/TALOS-2025-2224 - Exploit, Third Party Advisory
CPE cpe:2.3:a:sail:sail:0.9.8:*:*:*:*:*:*:*
Summary
  • (es) Existe una vulnerabilidad de corrupción de memoria en la función WebP Image Decoding de SAIL Image Decoding Library v0.9.8. Al cargar una animación .webp especialmente manipulada, se puede producir un desbordamiento de enteros al calcular el paso de decodificación. Esto provoca un desbordamiento del búfer del montón al decodificar la imagen, lo que puede provocar la ejecución remota de código. Un atacante deberá convencer a la librería para que lea un archivo para activar esta vulnerabilidad.

25 Aug 2025, 20:24

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-25 15:15

Updated : 2025-09-02 17:13


NVD link : CVE-2025-52456

Mitre link : CVE-2025-52456

CVE.ORG link : CVE-2025-52456


JSON object : View

Products Affected

sail

  • sail
CWE
CWE-680

Integer Overflow to Buffer Overflow