CVE-2025-7260

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plugin. The flaw exists in improper buffer validation during DXF parsing, enabling out-of-bounds writes that can lead to remote code execution. Users of IrfanView with the CADImage plugin installed are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Specific vulnerable versions not publicly detailed, but likely affects multiple recent versions prior to patching
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CADImage plugin to be installed and enabled in IrfanView. DXF file association with IrfanView increases risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Malware installation or data exfiltration when users open malicious DXF files from untrusted sources.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing the application.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but DXF files can be distributed via email, downloads, or compromised websites.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared network drives containing malicious DXF files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but the vulnerability is in a widely used plugin. ZDI has confirmed the vulnerability, suggesting exploit development is feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check latest IrfanView and plugin updates

Vendor Advisory: https://www.irfanview.com/

Restart Required: No

Instructions:

1. Open IrfanView
2. Go to Help > Check for Updates
3. Install all available updates
4. Verify CADImage plugin is updated to latest version

🔧 Temporary Workarounds

Disable DXF file association

windows

Remove IrfanView as default handler for DXF files

Control Panel > Default Programs > Set Default Programs > Select IrfanView > Choose defaults for this program > Uncheck .DXF

Remove CADImage plugin

windows

Temporarily disable or remove the vulnerable plugin

Navigate to IrfanView plugins folder and move or delete CADImage plugin files

🧯 If You Can't Patch

  • Implement application whitelisting to block IrfanView execution
  • Use Windows Defender Application Control or similar to restrict IrfanView to trusted directories only

🔍 How to Verify

Check if Vulnerable:

Check IrfanView Help > About for version and verify CADImage plugin is present

Check Version:

irfanview.exe /?

Verify Fix Applied:

Confirm IrfanView and all plugins are updated to latest versions from official site

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crashes when opening DXF files
  • Unexpected child processes spawned from IrfanView

Network Indicators:

  • IrfanView making unexpected outbound connections after opening files

SIEM Query:

Process Creation where Image contains 'irfanview' AND ParentImage contains 'explorer' AND CommandLine contains '.dxf'

🔗 References

📤 Share & Export