Critical (9.8)

Android Vulnerability (CVE-2026-4755)

CVE-2026-4755

CWE-20 vulnerability in MolotovCherry Android-ImageMagick7.This issue affects Android-ImageMagick7: before 7.1.2-11....

Overview

A critical security vulnerability, tracked as CVE-2026-4755, has been identified in the Android-ImageMagick7 library. This flaw is an improper input validation issue (CWE-20) that affects all versions prior to 7.1.2-11. Given its high severity rating (CVSS score of 9.8), immediate action is required to secure affected systems.

Vulnerability Details

In simple terms, Android-ImageMagick7 is a widely used library that allows Android applications to process, convert, and edit image files. The vulnerability stems from the library’s failure to properly validate or sanitize input from specially crafted image files. When an app using a vulnerable version of the library processes a malicious image-such as a PNG, JPEG, or WebP file-it can cause the application to crash or, in the worst case, allow an attacker to execute arbitrary code on the device.

The attack can be triggered remotely. A user could be exploited simply by opening a malicious image received through a messaging app, email, or a website, making this a significant threat vector.

Potential Impact

The impact of this vulnerability is severe. Successful exploitation could lead to:

  • Application Crashes (Denial of Service): Malicious images could cause apps to repeatedly crash, rendering them unusable.
  • Remote Code Execution (RCE): An attacker could potentially gain the ability to run their own code on the victim’s device with the permissions of the vulnerable application. This could lead to data theft, surveillance, or further compromise of the device.
  • System Instability: As a core image processing library, a flaw here could affect a wide range of applications, leading to broader device instability.

This flaw is particularly dangerous in the context of Android’s ecosystem, where malicious apps and sideloaded software are persistent threats. Recent security measures, like Google’s 24-hour wait for unverified app sideloading, aim to combat malware, but vulnerabilities in trusted libraries undermine these defenses.

Remediation and Mitigation

The primary and most effective action is to update the library.

  1. Patch Immediately: Developers must update their integration of the Android-ImageMagick7 library to version 7.1.2-11 or later. This version contains the necessary fixes to properly validate input and neutralize the threat.
  2. Update Applications: End-users should promptly install updates for any applications that utilize image processing, especially photo editors, gallery apps, social media platforms, and messaging apps, as soon as updates become available from the Google Play Store or other official channels.
  3. Exercise Caution: Until patches are applied, users should be cautious when opening image files from unknown or untrusted sources. This incident underscores the critical need for timely updates, a lesson echoed in other recent high-severity vulnerabilities like the Cisco FMC zero-day exploited by ransomware or the data exposure risks in cloud platforms.

Organizations with managed devices should push the patched library version and ensure all enterprise applications are compiled against the secure version.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.