Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12474: CWE-908 Use of Uninitialized Resource in Google libjxl

0
Low
VulnerabilityCVE-2025-12474cvecve-2025-12474cwe-908
Published: Wed Feb 11 2026 (02/11/2026, 15:27:24 UTC)
Source: CVE Database V5
Vendor/Project: Google
Product: libjxl

Description

CVE-2025-12474 is a low-severity vulnerability in Google’s libjxl version 0. 7, where a specially crafted JPEG XL file can cause the decoder to read pixel data from uninitialized memory due to an incorrect optimization. This occurs when the decoder references areas outside the image bounds in subsequent patches, leading to use of uninitialized but allocated memory. The vulnerability does not require privileges or authentication but does require user interaction to open a malicious file. Exploitation could lead to information disclosure of uninitialized memory contents, but no known exploits are reported in the wild. The CVSS score is 2. 3, reflecting low impact and high attack complexity. European organizations using libjxl in image processing or viewing applications should monitor for updates and apply patches when available. Countries with higher adoption of Google technologies and digital media processing are more likely to be affected. Mitigation includes avoiding use of vulnerable libjxl versions, validating input files, and employing sandboxing for image decoding processes.

AI-Powered Analysis

AILast updated: 02/11/2026, 16:01:09 UTC

Technical Analysis

CVE-2025-12474 is a vulnerability classified under CWE-908 (Use of Uninitialized Resource) affecting Google’s libjxl library version 0.7, which is used for decoding JPEG XL image files. The flaw arises from an incorrect optimization in the decoder’s handling of image patches, specifically when the decoder attempts to reference pixel data outside the bounds of the original image. This causes the decoder to read from uninitialized but allocated memory areas, potentially exposing residual data from memory buffers. The vulnerability requires a specially crafted JPEG XL file to trigger this behavior. Since the decoder reads uninitialized memory, sensitive information could be leaked if the memory contains residual data from prior operations. The vulnerability does not require any privileges or authentication but does require user interaction, such as opening or processing a malicious image file. The CVSS 4.0 vector indicates network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:P), and low impact on confidentiality and integrity (VC:L, VI:L), with no impact on availability. No known exploits have been reported in the wild as of the publication date. The vulnerability is currently unpatched, with no patch links available, so users of libjxl 0.7 should be cautious. The issue is primarily a risk for applications that decode untrusted JPEG XL images using the affected libjxl version.

Potential Impact

For European organizations, the primary impact of CVE-2025-12474 is the potential leakage of sensitive information through uninitialized memory exposure when processing malicious JPEG XL images. This could affect confidentiality if residual memory contains sensitive data. The vulnerability does not directly impact system integrity or availability. Organizations involved in digital media processing, content delivery, or any services that decode JPEG XL images using libjxl 0.7 are at risk. Attackers could exploit this by tricking users into opening malicious images, potentially leading to information disclosure. Although the severity is low, the risk increases in environments where sensitive data is processed in memory buffers that could be exposed. The lack of known exploits reduces immediate risk, but the vulnerability could be leveraged in targeted attacks. European sectors such as media companies, software developers, and cloud service providers that handle image decoding should be particularly vigilant.

Mitigation Recommendations

To mitigate CVE-2025-12474, European organizations should: 1) Avoid using libjxl version 0.7 for decoding JPEG XL images until an official patch is released by Google. 2) Monitor Google’s security advisories and update libjxl to patched versions promptly once available. 3) Implement strict input validation and sanitization for all image files, especially those from untrusted sources. 4) Employ sandboxing or isolation techniques for image decoding processes to limit the impact of potential memory disclosure. 5) Use alternative, well-maintained image decoding libraries if immediate patching is not feasible. 6) Educate users about the risks of opening untrusted image files and enforce policies to reduce exposure. 7) Conduct regular security assessments of media processing pipelines to detect anomalous behavior. These steps go beyond generic advice by focusing on controlling the attack vector (image files), limiting exposure through sandboxing, and proactive patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Google
Date Reserved
2025-10-29T16:11:30.108Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698ca44a4b57a58fa1a27f64

Added to database: 2/11/2026, 3:46:18 PM

Last enriched: 2/11/2026, 4:01:09 PM

Last updated: 2/11/2026, 5:08:47 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats