Description
A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
Published: 2025-08-21
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25444 A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
History

Fri, 24 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Saitoha
Saitoha libsixel
CPEs cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:* cpe:2.3:a:saitoha:libsixel:*:*:*:*:*:*:*:*
Vendors & Products Libsixel Project
Libsixel Project libsixel
Saitoha
Saitoha libsixel

Fri, 12 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Libsixel Project
Libsixel Project libsixel
Weaknesses CWE-787
CPEs cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*
Vendors & Products Libsixel Project
Libsixel Project libsixel

Thu, 21 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 Aug 2025 13:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in saitoha libsixel up to 1.10.3. Affected by this issue is the function sixel_debug_print_palette of the file src/encoder.c of the component img2sixel. The manipulation results in stack-based buffer overflow. The attack must be initiated from a local position. The exploit has been made public and could be used. The patch is identified as 316c086e79d66b62c0c4bc66229ee894e4fdb7d1. Applying a patch is advised to resolve this issue.
Title saitoha libsixel img2sixel encoder.c sixel_debug_print_palette stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Saitoha Libsixel
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2025-08-21T14:46:37.782Z

Reserved: 2025-08-21T05:25:08.724Z

Link: CVE-2025-9300

cve-icon Vulnrichment

Updated: 2025-08-21T13:22:52.368Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-21T13:15:37.873

Modified: 2026-04-29T01:00:01.613

Link: CVE-2025-9300

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses