CVE-2025-7308

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running vulnerable versions of IrfanView with the CADImage plugin. Attackers can exploit it by tricking users into opening malicious DWG files or visiting malicious web pages. Users of IrfanView with the CADImage plugin are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Specific versions not specified in advisory - all versions before patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires IrfanView with CADImage plugin installed. User interaction needed (opening malicious file).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the current user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or persistence mechanisms being established on the compromised system.

🟢

If Mitigated

Limited impact due to application sandboxing or restricted user privileges, potentially resulting in application crash rather than code execution.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening malicious DWG file). Memory corruption vulnerability in DWG parsing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView website for latest version

Vendor Advisory: https://www.irfanview.com/

Restart Required: Yes

Instructions:

1. Visit https://www.irfanview.com/
2. Download latest version of IrfanView
3. Install update
4. Restart system

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView

Navigate to IrfanView plugins directory and remove CADImage.dll

Block DWG Files

windows

Prevent IrfanView from opening DWG files via file association changes

Control Panel > Default Programs > Associate file type with program > Change .dwg association

🧯 If You Can't Patch

  • Restrict user privileges to limit potential damage from exploitation
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check IrfanView Help > About for version number and verify CADImage plugin is installed

Check Version:

Open IrfanView > Help > About

Verify Fix Applied:

Verify IrfanView version is latest from official website and test opening DWG files

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected process creation from IrfanView

Network Indicators:

  • Outbound connections from IrfanView process to suspicious IPs

SIEM Query:

Process Creation where Image contains 'i_view' AND ParentImage contains 'explorer'

🔗 References

📤 Share & Export