Cyber Posture

CVE-2025-65474

CriticalPublic PoC

Published: 11 December 2025

Published
11 December 2025
Modified
19 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 32.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

An arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below allows attackers to execute arbitrary code via renaming a PHP file to a SVG format.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the arbitrary file rename flaw in /admin/manager.php by identifying, reporting, and correcting vulnerabilities that enable RCE via file extension changes.

prevent

Validates inputs to the file rename functionality in /admin/manager.php to block arbitrary renaming of PHP files to executable SVG formats.

prevent

Enforces access control on the /admin/manager.php endpoint to prevent unauthenticated remote attackers from performing arbitrary file renames leading to RCE.

Security SummaryAI

CVE-2025-65474 is an arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below. The flaw enables attackers to execute arbitrary code by renaming a PHP file to an SVG format. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-706 and CWE-434.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, culminating in arbitrary code execution on the targeted system.

Advisories and further details, including potential mitigations or patches, are available at https://congsec.cn?id=20251103234511-9418dk9 and https://gist.github.com/CongSec/3cf968621f71a7da35dcc9b8f0b29bb2.

Details

CWE(s)

Affected Products

easyimages2.0 project
easyimages2.0
≤ 2.8.6

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Arbitrary file rename vulnerability in public-facing web application (/admin/manager.php) enables unauthenticated remote code execution via file extension manipulation (PHP to SVG).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References