CVE-2025-7298

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DXF files with IrfanView's CADImage plugin. The flaw exists in how the plugin parses DXF files, enabling attackers to read beyond allocated buffers and potentially gain control of the affected system. Users of IrfanView with the CADImage plugin installed are at risk.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the fix (specific version numbers not provided in reference)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the CADImage plugin to be installed and enabled in IrfanView. User must open a malicious DXF file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the user's machine, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Malicious code execution in the context of the current user, allowing file access, credential theft, and installation of additional malware.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially resulting in application crash rather than full compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening malicious file) and knowledge of the vulnerability details. The ZDI advisory suggests the vulnerability is being actively researched.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView website for latest version

Vendor Advisory: https://www.irfanview.com/

Restart Required: No

Instructions:

1. Visit https://www.irfanview.com/
2. Download and install the latest version of IrfanView
3. Ensure the CADImage plugin is updated to the latest version
4. Verify the update by checking the plugin version in IrfanView's plugin information

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins directory and remove or rename the CADImage plugin file

Block DXF Files

windows

Prevent IrfanView from opening DXF files via file association changes

Use Windows Settings > Apps > Default apps to change DXF file association away from IrfanView

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of IrfanView
  • Use network segmentation to isolate systems running IrfanView from critical assets

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version and plugin version. If using a version prior to the security update with CADImage plugin enabled, the system is vulnerable.

Check Version:

Open IrfanView, go to Help > About, check version information

Verify Fix Applied:

Verify IrfanView and CADImage plugin are updated to the latest version from the official website. Test with known safe DXF files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • IrfanView process crashes when opening DXF files
  • Unexpected network connections from IrfanView process
  • Creation of suspicious files or processes by IrfanView

Network Indicators:

  • Downloads of DXF files from untrusted sources
  • Outbound connections from IrfanView to suspicious IPs

SIEM Query:

Process:IrfanView AND (FileExtension:DXF OR FileName:*.dxf) AND (EventID:1000 OR EventID:1001)

🔗 References

📤 Share & Export