CVE-2025-7234

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Attackers can exploit this by tricking users into opening malicious CGM files or visiting malicious web pages. Users of IrfanView with the CADImage plugin are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires IrfanView with CADImage plugin installed. User interaction needed (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation leading to data exfiltration, system disruption, or use as a foothold for further attacks within the network.

🟢

If Mitigated

Limited impact due to application sandboxing, limited user privileges, or network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

User interaction required (opening malicious file). ZDI advisory suggests exploit is feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView website for latest version

Vendor Advisory: https://www.irfanview.com

Restart Required: No

Instructions:

1. Visit https://www.irfanview.com
2. Download latest version of IrfanView
3. Install update
4. Verify CADImage plugin is updated

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins directory and remove CADImage plugin files

Block CGM Files

all

Prevent opening of CGM files at system or network level

🧯 If You Can't Patch

  • Restrict user privileges to limit impact of code execution
  • Implement application whitelisting to prevent unauthorized executables

🔍 How to Verify

Check if Vulnerable:

Check IrfanView Help > About for version and verify CADImage plugin is present

Check Version:

Open IrfanView > Help > About

Verify Fix Applied:

Verify IrfanView version is latest and CADImage plugin version is updated

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs
  • Unexpected process execution from IrfanView

Network Indicators:

  • Downloads of CGM files from untrusted sources

SIEM Query:

Process creation where parent process is IrfanView and command line contains suspicious parameters

🔗 References

📤 Share & Export