CVE-2025-7237
IrfanView · IrfanView Multiple Products
A high-severity vulnerability has been discovered in the IrfanView CADImage plugin, which could allow an attacker to take full control of a user's computer.
Executive summary
A high-severity vulnerability has been discovered in the IrfanView CADImage plugin, which could allow an attacker to take full control of a user's computer. This is achieved by tricking a user into opening a specially crafted DWG (CAD) file, potentially leading to data theft, malware installation, or further network intrusion. Organizations are urged to apply the vendor-provided security patches immediately to mitigate this significant risk.
Vulnerability
The vulnerability is a memory corruption flaw within the CADImage plugin used by IrfanView to render DWG files. An attacker can exploit this by creating a malicious DWG file containing malformed data. When a user opens this file with a vulnerable version of IrfanView, the plugin's parsing mechanism improperly handles the data, leading to a memory corruption state that can be leveraged for remote code execution (RCE). Successful exploitation allows the attacker to run arbitrary code with the same privileges as the user who opened the file.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. A successful exploit could have severe consequences for the organization. An attacker could install ransomware, deploy spyware to steal sensitive intellectual property or credentials, or use the compromised workstation as a beachhead to move laterally across the corporate network. Specific risks include data breaches, financial loss from ransomware demands, reputational damage, and disruption to business operations that rely on the compromised systems or data.
Remediation
Immediate Action: Apply the security patches released by IrfanView immediately. Priority should be given to internet-facing systems and workstations used by employees who regularly handle external documents (e.g., engineers, designers). After patching, monitor systems for any signs of post-exploitation activity and review file access logs for unusual DWG file interactions preceding the patch deployment.
Proactive Monitoring: Implement enhanced monitoring to detect potential exploitation attempts. This includes watching for unusual child processes spawning from the IrfanView executable (i_view32.exe or i_view64.exe), unexpected network connections from the application, and alerts from Endpoint Detection and Response (EDR) systems related to memory protection violations. Monitor logs for a surge in DWG files being accessed from suspicious sources like email attachments or web downloads.
Compensating Controls: If immediate patching is not feasible, consider the following controls to reduce risk:
- Disable the CADImage.dll plugin within the IrfanView installation directory if DWG file viewing is not a business-critical function.
- Implement user awareness campaigns warning staff not to open unsolicited or untrusted DWG files.
- Use application control or whitelisting to prevent IrfanView from executing unknown code or creating suspicious child processes.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 7.8) and the potential for complete system compromise via a common attack vector (malicious file), this vulnerability presents a significant risk. Although there is no current evidence of active exploitation, organizations should act preemptively. The primary recommendation is to apply the vendor patch to all vulnerable IrfanView installations with urgency. If patching is delayed, implement the suggested compensating controls, particularly disabling the affected plugin, to mitigate the immediate threat.