ImageMagick endpoint

To get the vulnerability information of a ImageMagick version, you have to make a call including the major ImageMagick version (or the minor one). The response will include all vulnerabilities for this major version.

https://www.wpvulnerability.net/imagemagick/imagemagick-major-or-minor-version/

Example: ImageMagick 6.9

ImageMagick JSON response

This will return a JSON with the following format:

{
  "error": 0,
  "message": null,
  "data": {
    "name": "imagemagick 1.x",
    "imagemagick": "7.x",
    "status": "m",
    "date_start": "1970-01-01"
    "sate_end": "1971-12-31"
    "vulnerability": [
      {
        "uuid": "example",
        "name": "ImageMagick 8.x < 8.x.1",
        "operator": {
          "min_version": null,
          "min_operator": null,
          "max_version": "2.x.1",
          "max_operator": "lt",
          "unfixed": "0",
        },
        "source": [
          {
            "id": "CVE-0000-00001",
            "name": "CVE-0000-00001",
            "link": "https://www.cve.org/CVERecord?id=CVE-0000-00001",
            "description": "This is an example of a vulnerability description.",
            "date": "2003-05-27"
          }
        ],
        "impact": [
          "cvss": {
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "av": "n",
            "ac": "l",
            "pr": "n",
            "ui": "n",
            "s": "u",
            "c": "h",
            "i": "h",
            "a": "h",
            "score": "9.8",
            "severity": "c",
            "exploitable": "3.9",
            "impact": "5.9"
          },
          "cvss2": {
            "version": "2.0",
            "vector": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "score": "7.5",
            "severity": "high",
            "av": "network",
            "ac": "low",
            "au": "none",
            "c": "partial",
            "i": "partial",
            "a": "partial"
          },
          "cvss3": {
            "version": "3.1",
            "vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "score": "9.8",
            "severity": "critical",
            "av": "network",
            "ac": "low",
            "pr": "none",
            "ui": "none",
            "s": "unchanged",
            "c": "high",
            "i": "high",
            "a": "high",
            "exploitable": "3.9",
            "impact": "5.9"
          },
          "cvss4": {
            "version": "4.0",
            "vector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
            "score": "5.1",
            "severity": "medium",
            "av": "network",
            "ac": "low",
            "at": "none",
            "pr": "high",
            "ui": "none",
            "vc": "low",
            "vi": "low",
            "va": "low",
            "sc": "none",
            "si": "none",
            "sa": "none"
          },
          "kev": false,
          "cwe": [
            {
              "cwe": "CWE89",
              "name": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
              "description": "The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component."
            }
          ]
        ]
      }
    ]
  },
  "updated": 1053993600
}

ImageMagick JSON description

  • error: If there is an error, the value will be 1. If there is no error, it will be 0.
  • message: In case of error, an information message will be displayed.
  • data: (object) Data information group.
  • data → name: ImageMagick version.
  • data → imagemagick: ImageMagick major version.
  • data → status: (values) Information URL.
    • m: Maintained
    • s: Security support
    • d: Deprecated / Unmaintained
  • data → date_start: Date since the version was launched.
  • data → date_end: Date when the version was deprecated / unmaintained.
  • data → vulnerability: (array) Each of the plugin’s vulnerabilities.
    • data → vulnerability → uuid: ImageMagick unique vulnerability ID.
    • data → vulnerability → name: Vulnerability name.
    • data → vulnerability → operator: (object) Vulnerability version calculation system. It is based on the PHP version_compare function.
    • data → vulnerability → operator → min_version: Minimum version affected.
    • data → vulnerability → operator → min_operator: Calculation operator.
    • data → vulnerability → operator → max_version: Maximum version affected.
    • data → vulnerability → operator → max_operator: Calculation operator.
    • data → vulnerability → operator → unfixed: The vulnerability is unfixed.
  • data → vulnerability → source: (array) List of vulnerabilities.
    • data → vulnerability → source → id: Source unique identifier.
    • data → vulnerability → source → link: Source vulnerability information.
    • data → vulnerability → source → description: Source vulnerability description.
    • data → vulnerability → source → date: Date of publication of the vulnerability.
  • data → vulnerability → impact: (array) Impact of the vulnerability.
    • data → vulnerability → impact → cvss2: (object) CVSS 2.0 score.
      • data → vulnerability → impact → cvss → version: CVSS Version.
      • data → vulnerability → impact → cvss → vector: CVSS Vector.
      • data → vulnerability → impact → cvss → score: Base score.
      • data → vulnerability → impact → cvss → severity: Severity label.
      • data → vulnerability → impact → cvss → av: Access Vector.
      • data → vulnerability → impact → cvss → ac: Access Complexity.
      • data → vulnerability → impact → cvss → au: Authentication.
      • data → vulnerability → impact → cvss → c: Confidentiality Impact.
      • data → vulnerability → impact → cvss → i: Integrity Impact.
      • data → vulnerability → impact → cvss → a: Availability Impact.
    • data → vulnerability → impact → cvss3: (object) CVSS 3.0/3.1 score.
      • data → vulnerability → impact → cvss → version: CVSS Version.
      • data → vulnerability → impact → cvss → vector: CVSS Vector.
      • data → vulnerability → impact → cvss → score: Base score.
      • data → vulnerability → impact → cvss → severity: Severity label.
      • data → vulnerability → impact → cvss → av: Attack Vector.
      • data → vulnerability → impact → cvss → ac: Attack Complexity.
      • data → vulnerability → impact → cvss → pr: Privileges Required.
      • data → vulnerability → impact → cvss → ui: User Interaction.
      • data → vulnerability → impact → cvss → s: Scope.
      • data → vulnerability → impact → cvss → c: Confidentiality Impact.
      • data → vulnerability → impact → cvss → i: Integrity Impact.
      • data → vulnerability → impact → cvss → a: Availability Impact.
      • data → vulnerability → impact → cvss → exploitable: Exploitability sub-score.
      • data → vulnerability → impact → cvss → impact: Impact sub-score.
    • data → vulnerability → impact → cvss4: (object) CVSS 4.0 score.
      • data → vulnerability → impact → cvss → version: CVSS Version.
      • data → vulnerability → impact → cvss → vector: CVSS Vector.
      • data → vulnerability → impact → cvss → score: Base score.
      • data → vulnerability → impact → cvss → severity: Severity label.
      • data → vulnerability → impact → cvss → av: Attack Vector.
      • data → vulnerability → impact → cvss → ac: Attack Complexity.
      • data → vulnerability → impact → cvss → at: Attack Requirements.
      • data → vulnerability → impact → cvss → pr: Privileges Required.
      • data → vulnerability → impact → cvss → ui: User Interaction.
      • data → vulnerability → impact → cvss → vc: Vulnerable System Confidentiality.
      • data → vulnerability → impact → cvss → vi: Vulnerable System Integrity.
      • data → vulnerability → impact → cvss → va: Vulnerable System Availability.
      • data → vulnerability → impact → cvss → sc: Subsequent System Confidentiality.
      • data → vulnerability → impact → cvss → si: Subsequent System Integrity.
      • data → vulnerability → impact → cvss → sa: Subsequent System Availability.
    • data → vulnerability → impact → kev: Whether the vulnerability is in the CISA KEV catalog.
    • data → vulnerability → impact → cwe: (array) CWE score.
      • data → vulnerability → impact → cwe → cwe: CWE identification.
      • data → vulnerability → impact → cwe → name: Name.
      • data → vulnerability → impact → cwe → description: Description.
  • update: Last information update (UNIXTIME).

Important information

The ImageMagick API has information since ImageMagick 6.8, and also vulnerabilities that may apply to WordPress. This is not an ImageMagick vulnerability database.