CVE-2026-1837: CWE-805 in Google libjxl
A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data. This can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).
AI Analysis
Technical Summary
CVE-2026-1837 is a vulnerability in Google’s libjxl image decoding library, version 0.9, caused by improper handling of memory buffers during color transformation of grayscale images when the LCMS2 color management system is used. The flaw arises because the decoder allocates buffers sized for 1-float-per-pixel but then treats them as if they were sized for 3-float-per-pixel, leading to writes beyond the allocated memory region. This results in pixel data being written to uninitialized and unallocated memory, followed by copying data from other uninitialized memory regions into pixel buffers. The vulnerability is classified under CWE-805, which involves buffer access with incorrect length values, a common cause of memory corruption. Exploitation requires processing a specially crafted image file that triggers the flawed color transformation path. The vulnerability does not require any privileges or authentication but does require user interaction to open or process the malicious file. The vulnerability is specific to builds of libjxl that use LCMS2 as the color management system; alternative CMS engines selected via build flags are not affected. The CVSS 4.0 base score is 8.7, indicating high severity due to network attack vector, low attack complexity, no privileges required, no authentication, and high impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, but the issue is publicly disclosed and should be addressed promptly.
Potential Impact
The vulnerability can lead to memory corruption in applications using libjxl 0.9 with LCMS2 enabled, potentially causing application crashes, denial of service, or even arbitrary code execution depending on how the corrupted memory is leveraged. Since libjxl is used for decoding JPEG XL images, any software or service that processes these images with the vulnerable configuration is at risk. This includes image viewers, editors, web browsers, and server-side image processing pipelines. The impact on confidentiality, integrity, and availability is high because an attacker could exploit this flaw to execute arbitrary code, potentially leading to system compromise or data leakage. The requirement for user interaction (opening or processing a malicious image) limits the attack vector to targeted phishing or supply chain attacks. However, the wide adoption of libjxl in modern image processing stacks means that many organizations worldwide could be affected, especially those handling untrusted image content. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as public disclosure often leads to rapid exploit development.
Mitigation Recommendations
Organizations should immediately audit their use of libjxl, specifically checking if version 0.9 is in use and whether LCMS2 is enabled as the color management system. If possible, switch to an alternative CMS engine supported by libjxl that is not affected by this vulnerability. Apply any available patches or updates from Google or the libjxl maintainers as soon as they are released. In the absence of patches, consider disabling or restricting the processing of JPEG XL images from untrusted sources, especially those that require color transformation of grayscale images. Implement strict input validation and sandboxing for image processing components to limit the impact of potential exploitation. Monitor for suspicious activity related to image processing and maintain up-to-date intrusion detection signatures. Additionally, educate users about the risks of opening untrusted image files and enforce policies to reduce exposure to malicious content.
Affected Countries
United States, Germany, Japan, South Korea, China, United Kingdom, France, Canada, Australia, Netherlands
CVE-2026-1837: CWE-805 in Google libjxl
Description
A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data. This can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1837 is a vulnerability in Google’s libjxl image decoding library, version 0.9, caused by improper handling of memory buffers during color transformation of grayscale images when the LCMS2 color management system is used. The flaw arises because the decoder allocates buffers sized for 1-float-per-pixel but then treats them as if they were sized for 3-float-per-pixel, leading to writes beyond the allocated memory region. This results in pixel data being written to uninitialized and unallocated memory, followed by copying data from other uninitialized memory regions into pixel buffers. The vulnerability is classified under CWE-805, which involves buffer access with incorrect length values, a common cause of memory corruption. Exploitation requires processing a specially crafted image file that triggers the flawed color transformation path. The vulnerability does not require any privileges or authentication but does require user interaction to open or process the malicious file. The vulnerability is specific to builds of libjxl that use LCMS2 as the color management system; alternative CMS engines selected via build flags are not affected. The CVSS 4.0 base score is 8.7, indicating high severity due to network attack vector, low attack complexity, no privileges required, no authentication, and high impact on confidentiality, integrity, and availability. No public exploits or patches are currently available, but the issue is publicly disclosed and should be addressed promptly.
Potential Impact
The vulnerability can lead to memory corruption in applications using libjxl 0.9 with LCMS2 enabled, potentially causing application crashes, denial of service, or even arbitrary code execution depending on how the corrupted memory is leveraged. Since libjxl is used for decoding JPEG XL images, any software or service that processes these images with the vulnerable configuration is at risk. This includes image viewers, editors, web browsers, and server-side image processing pipelines. The impact on confidentiality, integrity, and availability is high because an attacker could exploit this flaw to execute arbitrary code, potentially leading to system compromise or data leakage. The requirement for user interaction (opening or processing a malicious image) limits the attack vector to targeted phishing or supply chain attacks. However, the wide adoption of libjxl in modern image processing stacks means that many organizations worldwide could be affected, especially those handling untrusted image content. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as public disclosure often leads to rapid exploit development.
Mitigation Recommendations
Organizations should immediately audit their use of libjxl, specifically checking if version 0.9 is in use and whether LCMS2 is enabled as the color management system. If possible, switch to an alternative CMS engine supported by libjxl that is not affected by this vulnerability. Apply any available patches or updates from Google or the libjxl maintainers as soon as they are released. In the absence of patches, consider disabling or restricting the processing of JPEG XL images from untrusted sources, especially those that require color transformation of grayscale images. Implement strict input validation and sandboxing for image processing components to limit the impact of potential exploitation. Monitor for suspicious activity related to image processing and maintain up-to-date intrusion detection signatures. Additionally, educate users about the risks of opening untrusted image files and enforce policies to reduce exposure to malicious content.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Date Reserved
- 2026-02-03T16:27:32.730Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698ca44a4b57a58fa1a27f67
Added to database: 2/11/2026, 3:46:18 PM
Last enriched: 2/27/2026, 8:25:19 AM
Last updated: 3/28/2026, 10:06:05 PM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.