Android Vulnerability (CVE-2026-4755)
CVE-2026-4755
Remote code execution in Android-ImageMagick7 library before 7.1.2-11. Processing a malicious image triggers buffer overflow granting unauthenticated RCE. Update to version 7.1.2-11 now.
Patch now - CVE-2026-4755 is a critical remote code execution vulnerability in Android-ImageMagick7 versions prior to 7.1.2-11 that grants an unauthenticated attacker full code execution on the victim device simply by processing a malicious image file. Update to version 7.1.2-11 immediately to block this attack vector.
Overview
A critical security vulnerability, tracked as CVE-2026-4755, has been identified in the Android-ImageMagick7 library. This flaw is an improper input validation issue (CWE-20) that affects all versions prior to 7.1.2-11. Given its high severity rating (CVSS score of 9.8), immediate action is required to secure affected systems.
Vulnerability Details
In simple terms, Android-ImageMagick7 is a widely used library that allows Android applications to process, convert, and edit image files. The vulnerability stems from the library’s failure to properly validate or sanitize input from specially crafted image files. When an app using a vulnerable version of the library processes a malicious image-such as a PNG, JPEG, or WebP file-it can cause the application to crash or, in the worst case, allow an attacker to execute arbitrary code on the device.
The attack can be triggered remotely. A user could be exploited simply by opening a malicious image received through a messaging app, email, or a website, making this a significant threat vector.
Potential Impact
The impact of this vulnerability is severe. Successful exploitation could lead to:
- Application Crashes (Denial of Service): Malicious images could cause apps to repeatedly crash, rendering them unusable.
- Remote Code Execution (RCE): An attacker could potentially gain the ability to run their own code on the victim’s device with the permissions of the vulnerable application. This could lead to data theft, surveillance, or further compromise of the device.
- System Instability: As a core image processing library, a flaw here could affect a wide range of applications, leading to broader device instability.
This flaw is particularly dangerous in the context of Android’s ecosystem, where malicious apps and sideloaded software are persistent threats. Recent security measures, like Google’s 24-hour wait for unverified app sideloading, aim to combat malware, but vulnerabilities in trusted libraries undermine these defenses.
Remediation and Mitigation
The primary and most effective action is to update the library.
- Patch Immediately: Developers must update their integration of the Android-ImageMagick7 library to version 7.1.2-11 or later. This version contains the necessary fixes to properly validate input and neutralize the threat.
- Update Applications: End-users should promptly install updates for any applications that utilize image processing, especially photo editors, gallery apps, social media platforms, and messaging apps, as soon as updates become available from the Google Play Store or other official channels.
- Exercise Caution: Until patches are applied, users should be cautious when opening image files from unknown or untrusted sources. This incident underscores the critical need for timely updates, a lesson echoed in other recent high-severity vulnerabilities like the Cisco FMC zero-day exploited by ransomware or the data exposure risks in cloud platforms.
Organizations with managed devices should push the patched library version and ensure all enterprise applications are compiled against the secure version.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
PraisonAI is a multi-agent teams system. Prior to version 4.6.34, PraisonAI's MCP (Model Context Protocol) server (praisonai mcp serve) registers four file-handling tools by default — praisonai.rules....
Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SS...
Apache Polaris can issue broad temporary ("vended") storage credentials during staged table creation before the effective table location has been validated or durably reserved. Those temporary creden...
Apache Polaris accepts literal `*` characters in namespace and table names. When it later builds temporary S3 access policies for delegated table access, those same characters appear to be reused unes...