CVE-2025-7314

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plugin. The memory corruption flaw occurs during DWG file parsing due to improper input validation. Users of IrfanView with the vulnerable CADImage plugin are affected.

💻 Affected Systems

Products:
  • IrfanView CADImage Plugin
Versions: Versions prior to the patched release
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user interaction to open malicious DWG file. IrfanView itself may be bundled with the vulnerable plugin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Attacker executes code with user privileges, potentially installing malware, stealing files, or establishing persistence on the system.

🟢

If Mitigated

Limited impact due to application sandboxing, limited user privileges, or network segmentation preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening malicious file). Exploit development requires understanding of DWG file format and memory corruption techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check IrfanView website for latest version with fixed CADImage plugin

Vendor Advisory: https://www.irfanview.com/

Restart Required: Yes

Instructions:

1. Visit https://www.irfanview.com/
2. Download latest version of IrfanView
3. Install/update to latest version
4. Restart system

🔧 Temporary Workarounds

Disable CADImage Plugin

windows

Remove or disable the vulnerable CADImage plugin from IrfanView installation

Navigate to IrfanView plugins directory and remove CADImage.dll or similar plugin file

Block DWG File Association

windows

Prevent IrfanView from opening DWG files by default

Use Windows File Association settings to change default program for .dwg files

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of IrfanView
  • Use network segmentation to isolate systems running IrfanView from critical assets

🔍 How to Verify

Check if Vulnerable:

Check IrfanView version and plugin versions. Vulnerable if using CADImage plugin before patched version.

Check Version:

Open IrfanView → Help → About or check program properties

Verify Fix Applied:

Verify IrfanView and CADImage plugin are updated to latest versions from official source.

📡 Detection & Monitoring

Log Indicators:

  • IrfanView crash logs with memory access violations
  • Unexpected IrfanView process spawning child processes

Network Indicators:

  • Outbound connections from IrfanView process to unknown IPs
  • DNS requests for suspicious domains from IrfanView

SIEM Query:

Process creation where parent process contains 'i_view' and child process is suspicious (e.g., cmd.exe, powershell.exe)

🔗 References

📤 Share & Export