CVE-2025-48379

| EUVD-2025-19662 HIGH
7.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Lifecycle Timeline

5
Analysis Generated
Mar 16, 2026 - 01:42 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 01:42 euvd
EUVD-2025-19662
Patch Released
Mar 16, 2026 - 01:42 nvd
Patch available
PoC Detected
Oct 15, 2025 - 20:03 vuln.today
Public exploit code
CVE Published
Jul 01, 2025 - 19:15 nvd
HIGH 7.1

Description

Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for available space. This only affects users who save untrusted data as a compressed DDS image. This issue has been patched in version 11.3.0.

Analysis

Pillow is a Python imaging library. In versions 11.2.0 to before 11.3.0, there is a heap buffer overflow when writing a sufficiently large (>64k encoded with default settings) image in the DDS format due to writing into a buffer without checking for available space. This only affects users who save untrusted data as a compressed DDS image. This issue has been patched in version 11.3.0.

Technical Context

A buffer overflow occurs when data written to a buffer exceeds its allocated size, potentially overwriting adjacent memory and corrupting program state. This vulnerability is classified as Heap-based Buffer Overflow (CWE-122).

Affected Products

Affected products: Python Pillow 11.2.1

Remediation

A vendor patch is available — apply it immediately. Use memory-safe languages or bounds-checked functions. Enable ASLR, DEP/NX, and stack canaries. Apply vendor patches promptly.

Priority Score

56
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +36
POC: +20

Vendor Status

Ubuntu

Priority: Medium
pillow
Release Status Version
upstream not-affected debian: Vulnerable code not present
bionic not-affected code not present
focal not-affected code not present
jammy not-affected code not present
noble not-affected code not present
oracular not-affected code not present
plucky not-affected code not present
trusty not-affected code not present
xenial not-affected code not present
pillow-python2
Release Status Version
jammy DNE -
noble DNE -
oracular DNE -
plucky DNE -
upstream needs-triage -
focal not-affected code not present

Debian

pillow
Release Status Fixed Version Urgency
bullseye fixed 8.1.2+dfsg-0.3+deb11u2 -
bullseye (security) fixed 8.1.2+dfsg-0.3+deb11u3 -
bookworm, bookworm (security) fixed 9.4.0-1.1+deb12u1 -
trixie (security), trixie fixed 11.1.0-5+deb13u1 -
forky, sid fixed 12.1.1-1 -
(unstable) not-affected - -

Share

CVE-2025-48379 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy