CVE-2025-65474
Published: 11 December 2025
Description
An arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below allows attackers to execute arbitrary code via renaming a PHP file to a SVG format.
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the arbitrary file rename flaw in /admin/manager.php by identifying, reporting, and correcting vulnerabilities that enable RCE via file extension changes.
Validates inputs to the file rename functionality in /admin/manager.php to block arbitrary renaming of PHP files to executable SVG formats.
Enforces access control on the /admin/manager.php endpoint to prevent unauthenticated remote attackers from performing arbitrary file renames leading to RCE.
Security SummaryAI
CVE-2025-65474 is an arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below. The flaw enables attackers to execute arbitrary code by renaming a PHP file to an SVG format. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-706 and CWE-434.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, culminating in arbitrary code execution on the targeted system.
Advisories and further details, including potential mitigations or patches, are available at https://congsec.cn?id=20251103234511-9418dk9 and https://gist.github.com/CongSec/3cf968621f71a7da35dcc9b8f0b29bb2.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file rename vulnerability in public-facing web application (/admin/manager.php) enables unauthenticated remote code execution via file extension manipulation (PHP to SVG).