Cyber Posture

CVE-2025-65474

CriticalPublic PoC

Published: 11 December 2025

Published
11 December 2025
Modified
19 December 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-65474 is a critical-severity Use of Incorrectly-Resolved Name or Reference (CWE-706) vulnerability in Easyimages2.0 Project Easyimages2.0. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the arbitrary file rename flaw in /admin/manager.php by identifying, reporting, and correcting vulnerabilities that enable RCE via file extension changes.

prevent

Validates inputs to the file rename functionality in /admin/manager.php to block arbitrary renaming of PHP files to executable SVG formats.

prevent

Enforces access control on the /admin/manager.php endpoint to prevent unauthenticated remote attackers from performing arbitrary file renames leading to RCE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Arbitrary file rename vulnerability in public-facing web application (/admin/manager.php) enables unauthenticated remote code execution via file extension manipulation (PHP to SVG).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below allows attackers to execute arbitrary code via renaming a PHP file to a SVG format.

Deeper analysisAI

CVE-2025-65474 is an arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below. The flaw enables attackers to execute arbitrary code by renaming a PHP file to an SVG format. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-706 and CWE-434.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, culminating in arbitrary code execution on the targeted system.

Advisories and further details, including potential mitigations or patches, are available at https://congsec.cn?id=20251103234511-9418dk9 and https://gist.github.com/CongSec/3cf968621f71a7da35dcc9b8f0b29bb2.

Details

CWE(s)

Affected Products

easyimages2.0 project
easyimages2.0
≤ 2.8.6

CVEs Like This One

CVE-2025-65471Same product: Easyimages2.0 Project Easyimages2.0
CVE-2025-65473Same product: Easyimages2.0 Project Easyimages2.0
CVE-2025-34299Shared CWE-434
CVE-2025-15158Shared CWE-434
CVE-2025-13156Shared CWE-434
CVE-2026-1358Shared CWE-434
CVE-2025-52691Shared CWE-434
CVE-2025-12974Shared CWE-434
CVE-2025-13069Shared CWE-434
CVE-2025-34328Shared CWE-434

References