CVE-2025-7253

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Attackers can exploit this by tricking users into opening malicious DWG files or visiting malicious web pages. The vulnerability affects users who have IrfanView with the CADImage plugin installed.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires IrfanView with CADImage plugin installed. User interaction needed (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to user account compromise, data exfiltration, and potential installation of persistent malware.

🟢

If Mitigated

Limited impact due to application sandboxing or restricted user privileges, potentially resulting only in application crash.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

User interaction required (opening malicious file). Memory corruption vulnerability with reliable exploitation likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView website for latest CADImage plugin update

Vendor Advisory: https://www.irfanview.com/

Restart Required: No

Instructions:

1. Visit the official IrfanView website
2. Download the latest version of IrfanView with updated CADImage plugin
3. Install the update following vendor instructions
4. Verify the plugin version is updated

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins directory and remove CADImage plugin files

Block DWG File Extensions

windows

Prevent IrfanView from opening DWG files via file association changes

Use Windows Group Policy or registry to modify file associations

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of IrfanView
  • Use network segmentation to isolate systems running IrfanView from critical assets

🔍 How to Verify

Check if Vulnerable:

Check IrfanView Help > About dialog for CADImage plugin version and compare with latest version on vendor site

Check Version:

Open IrfanView, go to Help > About, check plugin versions

Verify Fix Applied:

Verify CADImage plugin version matches or exceeds the patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs
  • Unexpected process creation from IrfanView
  • Memory access violation events in Windows Event Logs

Network Indicators:

  • Outbound connections from IrfanView process to unknown IPs
  • DNS requests for suspicious domains from systems running IrfanView

SIEM Query:

Process Creation where Image contains 'i_view' AND ParentImage contains 'explorer' AND CommandLine contains '.dwg'

🔗 References

📤 Share & Export