CVE-2025-23362

6.1 MEDIUM

📋 TL;DR

EXIF Viewer Classic versions 2.3.2 and 2.4.0 contain a cross-site scripting vulnerability that allows attackers to execute arbitrary JavaScript in users' browsers when they view images with malicious EXIF metadata. This affects users of the Chrome extension who haven't updated to version 3.0.1 or later. The vulnerability could lead to session hijacking, credential theft, or other client-side attacks.

💻 Affected Systems

Products:
  • EXIF Viewer Classic
Versions: 2.3.2 and 2.4.0
Operating Systems: All platforms where Chrome browser runs
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Chrome extension version, not standalone applications. Users must have the vulnerable extension installed and view images with crafted EXIF metadata.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user sessions, credentials, or sensitive data from the browser, perform actions as the user, or redirect to malicious sites.

🟠

Likely Case

Attackers could inject malicious scripts that steal cookies or session tokens, potentially compromising user accounts on websites where the extension is active.

🟢

If Mitigated

With proper Content Security Policy headers and modern browser protections, script execution might be blocked, limiting impact to minor UI manipulation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires users to view images with malicious EXIF metadata, which could be delivered via websites, emails, or social media.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.1 and later

Vendor Advisory: https://jvn.jp/en/jp/JVN05508012/

Restart Required: No

Instructions:

1. Open Chrome browser. 2. Go to chrome://extensions/. 3. Find EXIF Viewer Classic. 4. Click 'Update' or remove and reinstall from Chrome Web Store. 5. Verify version is 3.0.1 or higher.

🔧 Temporary Workarounds

Disable Extension

all

Temporarily disable the EXIF Viewer Classic extension until patched.

chrome://extensions/ → Toggle OFF for EXIF Viewer Classic

Remove Extension

all

Completely remove the vulnerable extension.

chrome://extensions/ → Click 'Remove' for EXIF Viewer Classic

🧯 If You Can't Patch

  • Disable JavaScript execution for the extension via Content Security Policy if possible.
  • Use browser extensions that block XSS payloads or sanitize EXIF data.

🔍 How to Verify

Check if Vulnerable:

Check extension version in chrome://extensions/. If version is 2.3.2 or 2.4.0, you are vulnerable.

Check Version:

chrome://extensions/ → Find EXIF Viewer Classic → Check version number

Verify Fix Applied:

Confirm extension version is 3.0.1 or higher in chrome://extensions/.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in browser console related to EXIF parsing
  • Errors from EXIF Viewer Classic extension

Network Indicators:

  • Requests to unexpected domains after viewing images
  • Suspicious data exfiltration patterns

SIEM Query:

Not applicable for client-side browser extension vulnerability

🔗 References

📤 Share & Export