Browse all 30 CVE security advisories affecting GIMP. AI-powered Chinese analysis, POCs, and references for each vulnerability.
GIMP is a free and open-source raster graphics editor primarily used for image manipulation, composition, and conversion. As a desktop application rather than a web service, it does not typically suffer from remote code execution or cross-site scripting vulnerabilities common in server-side software. Its security profile is largely defined by local privilege escalation risks and memory corruption issues within its core libraries, such as ImageMagick, which it relies on for parsing various file formats. Historically, flaws have allowed attackers to execute arbitrary code or crash the application through malformed images, though these rarely impact system integrity beyond the user’s session. The current record of thirty Common Vulnerabilities and Exposures highlights ongoing maintenance challenges in its complex codebase. While no major widespread breaches have occurred, the reliance on external libraries necessitates rigorous patching to mitigate potential exploitation vectors for local users.
This page lists every published CVE security advisory associated with GIMP. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.