CVE-2025-65473

An arbitrary file rename vulnerability in the /admin/filer.php component of EasyImages 2.0 v2.8.6 and below allows attackers with Administrator privileges to execute arbitrary code via injecting a crafted payload into an uploaded file name.
References
Link Resource
https://congsec.cn?id=20251103235610-7t4en7j Exploit Third Party Advisory
https://gist.github.com/CongSec/107b9cab6dd1cb297a738f11e2b2dbb6 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:easyimages2.0_project:easyimages2.0:*:*:*:*:*:*:*:*

History

15 Dec 2025, 19:28

Type Values Removed Values Added
References () https://congsec.cn?id=20251103235610-7t4en7j - () https://congsec.cn?id=20251103235610-7t4en7j - Exploit, Third Party Advisory
References () https://gist.github.com/CongSec/107b9cab6dd1cb297a738f11e2b2dbb6 - () https://gist.github.com/CongSec/107b9cab6dd1cb297a738f11e2b2dbb6 - Exploit, Third Party Advisory
CPE cpe:2.3:a:easyimages2.0_project:easyimages2.0:*:*:*:*:*:*:*:*
First Time Easyimages2.0 Project
Easyimages2.0 Project easyimages2.0

11 Dec 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-11 17:15

Updated : 2025-12-15 19:28


NVD link : CVE-2025-65473

Mitre link : CVE-2025-65473

CVE.ORG link : CVE-2025-65473


JSON object : View

Products Affected

easyimages2.0_project

  • easyimages2.0
CWE
CWE-73

External Control of File Name or Path