CVE-2025-65474
Published: 11 December 2025
Summary
CVE-2025-65474 is a critical-severity Use of Incorrectly-Resolved Name or Reference (CWE-706) vulnerability in Easyimages2.0 Project Easyimages2.0. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the arbitrary file rename flaw in /admin/manager.php by identifying, reporting, and correcting vulnerabilities that enable RCE via file extension changes.
Validates inputs to the file rename functionality in /admin/manager.php to block arbitrary renaming of PHP files to executable SVG formats.
Enforces access control on the /admin/manager.php endpoint to prevent unauthenticated remote attackers from performing arbitrary file renames leading to RCE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Arbitrary file rename vulnerability in public-facing web application (/admin/manager.php) enables unauthenticated remote code execution via file extension manipulation (PHP to SVG).
NVD Description
An arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below allows attackers to execute arbitrary code via renaming a PHP file to a SVG format.
Deeper analysisAI
CVE-2025-65474 is an arbitrary file rename vulnerability in the /admin/manager.php component of EasyImages 2.0 v2.8.6 and below. The flaw enables attackers to execute arbitrary code by renaming a PHP file to an SVG format. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-706 and CWE-434.
Unauthenticated attackers can exploit this vulnerability remotely over the network with low attack complexity and without requiring user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, culminating in arbitrary code execution on the targeted system.
Advisories and further details, including potential mitigations or patches, are available at https://congsec.cn?id=20251103234511-9418dk9 and https://gist.github.com/CongSec/3cf968621f71a7da35dcc9b8f0b29bb2.
Details
- CWE(s)