CVE-2025-30325

7.8 HIGH

📋 TL;DR

An integer overflow vulnerability in Adobe Photoshop allows arbitrary code execution when a user opens a malicious file. This affects Photoshop Desktop users running vulnerable versions. Attackers can exploit this to run code with the victim's privileges.

💻 Affected Systems

Products:
  • Adobe Photoshop Desktop
Versions: 26.5, 25.12.2 and earlier
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Malware installation or data exfiltration through crafted image files sent via phishing or downloaded from untrusted sources.

🟢

If Mitigated

Limited impact with proper user training and file restrictions, though successful exploitation still grants user-level access.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.5.1 and 25.12.3

Vendor Advisory: https://helpx.adobe.com/security/products/photoshop/apsb25-40.html

Restart Required: Yes

Instructions:

1. Open Adobe Creative Cloud application. 2. Navigate to 'Apps' section. 3. Find Photoshop and click 'Update'. 4. Restart Photoshop after update completes.

🔧 Temporary Workarounds

Restrict Photoshop file types

all

Configure system to only allow trusted .psd files to open with Photoshop

Disable Photoshop file associations

windows

Remove Photoshop as default handler for image files temporarily

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized Photoshop execution
  • Use network segmentation to isolate Photoshop workstations from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check Photoshop version via Help > About Photoshop. If version is 26.5, 25.12.2 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name='Adobe Photoshop' get version

Verify Fix Applied:

Verify Photoshop version is 26.5.1 or 25.12.3 or later after update.

📡 Detection & Monitoring

Log Indicators:

  • Photoshop crash logs with memory access violations
  • Unexpected Photoshop child processes

Network Indicators:

  • Outbound connections from Photoshop to unknown IPs post-file open

SIEM Query:

process_name='photoshop.exe' AND (event_id=1000 OR parent_process NOT IN ('explorer.exe', 'creativecloud.exe'))

🔗 References

📤 Share & Export