CVE-2025-7314
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious DWG files with IrfanView's CADImage plugin. The memory corruption flaw occurs during DWG file parsing due to improper input validation. Users of IrfanView with the vulnerable CADImage plugin are affected.
💻 Affected Systems
- IrfanView CADImage Plugin
📦 What is this software?
Cadimage by Cadsofttools
Cadimage by Cadsofttools
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining the same privileges as the user running IrfanView, potentially leading to data theft, ransomware deployment, or lateral movement.
Likely Case
Attacker executes code with user privileges, potentially installing malware, stealing files, or establishing persistence on the system.
If Mitigated
Limited impact due to application sandboxing, limited user privileges, or network segmentation preventing lateral movement.
🎯 Exploit Status
Requires user interaction (opening malicious file). Exploit development requires understanding of DWG file format and memory corruption techniques.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check IrfanView website for latest version with fixed CADImage plugin
Vendor Advisory: https://www.irfanview.com/
Restart Required: Yes
Instructions:
1. Visit https://www.irfanview.com/
2. Download latest version of IrfanView
3. Install/update to latest version
4. Restart system
🔧 Temporary Workarounds
Disable CADImage Plugin
windowsRemove or disable the vulnerable CADImage plugin from IrfanView installation
Navigate to IrfanView plugins directory and remove CADImage.dll or similar plugin file
Block DWG File Association
windowsPrevent IrfanView from opening DWG files by default
Use Windows File Association settings to change default program for .dwg files
🧯 If You Can't Patch
- Implement application whitelisting to prevent execution of IrfanView
- Use network segmentation to isolate systems running IrfanView from critical assets
🔍 How to Verify
Check if Vulnerable:
Check IrfanView version and plugin versions. Vulnerable if using CADImage plugin before patched version.
Check Version:
Open IrfanView → Help → About or check program properties
Verify Fix Applied:
Verify IrfanView and CADImage plugin are updated to latest versions from official source.
📡 Detection & Monitoring
Log Indicators:
- IrfanView crash logs with memory access violations
- Unexpected IrfanView process spawning child processes
Network Indicators:
- Outbound connections from IrfanView process to unknown IPs
- DNS requests for suspicious domains from IrfanView
SIEM Query:
Process creation where parent process contains 'i_view' and child process is suspicious (e.g., cmd.exe, powershell.exe)