Vulnerability Description
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gegl | Gegl | < 0.4.34 |
| Gimp | Gimp | < 2.10.30 |
| Redhat | Enterprise Linux | 7.0 |
| Fedoraproject | Fedora | 34 |
References
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adocRelease NotesThird Party Advisory
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429fPatchThird Party Advisory
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298Vendor Advisory
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993PatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/Release NotesVendor Advisory
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adocRelease NotesThird Party Advisory
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429fPatchThird Party Advisory
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298Vendor Advisory
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2025/10/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/Release NotesVendor Advisory
FAQ
What is CVE-2021-45463?
CVE-2021-45463 is a vulnerability with a CVSS score of 7.8 (HIGH). load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of ...
How severe is CVE-2021-45463?
CVE-2021-45463 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-45463?
Check the references section above for vendor advisories and patch information. Affected products include: Gegl Gegl, Gimp Gimp, Redhat Enterprise Linux, Fedoraproject Fedora.