CVE Alert: CVE-2025-52456 – SAIL Image Decoding Library – SAIL Image Decoding Library

CVE-2025-52456

HIGHNo exploitation knownPoC observed

A memory corruption vulnerability exists in the WebP Image Decoding functionality of the SAIL Image Decoding Library v0.9.8. When loading a specially crafted .webp animation an integer overflow can be made to occur when calculating the stride for decoding. Afterwards, this will cause a heap-based buffer to overflow when decoding the image which can lead to remote code execution. An attacker will need to convince the library to read a file to trigger this vulnerability.

CVSS v3.1 (8.8)
AV NETWORK · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
SAIL Image Decoding Library
Product
SAIL Image Decoding Library
Versions
v0.9.8
CWE
CWE-680, CWE-680: Integer Overflow to Buffer Overflow
Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Published
2025-08-25T14:17:35.230Z
Updated
2025-08-25T19:03:08.616Z

AI Summary Analysis

Risk verdict

High risk: remote code execution possible via crafted WebP decoding, with a PoC available and network-remote potential requiring user interaction.

Why this matters

A successful exploit could give an attacker control over the host process decoding images, jeopardising confidentiality, integrity and availability. Any service or application that embeds this image-decoding library and handles user-supplied WebP content is at direct risk, including media servers, content platforms and mobile apps.

Most likely attack path

Attacker delivers a specially crafted WebP file over the network; the victim or an associated application loads the file and triggers the library’s decoding path. The exploit relies on user interaction (opening or processing the file), with no privileges required and the scope remaining within the affected process, leading to heap-based corruption and potential remote code execution.

Who is most exposed

Deployments that integrate image decoding libraries into user-facing components or content pipelines—web services, CMS backends, media processing services and mobile apps that accept or fetch user-supplied WebP images.

Detection ideas

  • Crashes or stalls in the WebP decode path with heap/ allocator errors; heap corruption traces.
  • Memory corruption faults (segmentation faults) during image loading.
  • Logs showing decoding of anomalously large or crafted WebP payloads.
  • Indicators of failed image decoding attempts followed by abnormal resource usage.
  • PoC-specific payloads observed attempting WebP decode in exposed endpoints.

Mitigation and prioritisation

  • Apply vendor patched release or upgrade to a version that fixes the overflow.
  • If upgrading is not feasible, disable or sandbox WebP decoding where possible; constrain decoding to trusted inputs.
  • Enforce strict input validation and content filtering for image uploads or streams.
  • Run vulnerable components with least privilege and run inside memory-protected, isolated environments.
  • Coordinate with change-management to test compatibility and monitor for related CVEs and vendor advisories.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.