CVE-2025-7238

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plugin. Attackers can gain full control of the affected system through a buffer overflow in the DXF parsing component. Users of IrfanView with the CADImage plugin installed are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the fix (specific version not provided in CVE details)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CADImage plugin to be installed and enabled in IrfanView. The vulnerability is triggered when opening DXF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malware installation or system compromise when users open malicious DXF files from untrusted sources, with attackers typically gaining user-level access.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially containing the damage to the application context.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file). The vulnerability is an out-of-bounds write that can lead to arbitrary code execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView updates or vendor advisory for specific version

Vendor Advisory: https://www.irfanview.com/

Restart Required: Yes

Instructions:

1. Open IrfanView
2. Go to Help > Check for Updates
3. Follow update instructions
4. Restart IrfanView after update

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins folder and remove or rename CADImage plugin files

Block DXF File Association

windows

Prevent IrfanView from opening DXF files by default

Use Windows File Association settings to change DXF file handler to another application

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use endpoint protection with exploit prevention capabilities

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version and verify if CADImage plugin is installed/enabled

Check Version:

Open IrfanView and go to Help > About or check program properties

Verify Fix Applied:

Verify IrfanView has been updated to latest version and CADImage plugin version is patched

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected process creation from IrfanView

Network Indicators:

  • Downloads of DXF files from untrusted sources
  • Outbound connections from IrfanView process

SIEM Query:

Process Creation where Parent Process contains 'i_view' AND Command Line contains '.dxf'

🔗 References

📤 Share & Export